WorldWideScience

Sample records for scheme fingerprint recognition

  1. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  2. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  3. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  4. Longitudinal study of fingerprint recognition.

    Science.gov (United States)

    Yoon, Soweon; Jain, Anil K

    2015-07-14

    Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject's age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis.

  5. Fingerprint Recognition Using Minutia Score Matching

    OpenAIRE

    J, Ravi.; Raja, K. B.; R, Venugopal. K.

    2010-01-01

    The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person’s life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae ...

  6. Influence of Skin Diseases on Fingerprint Recognition

    Science.gov (United States)

    Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon

    2012-01-01

    There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described. PMID:22654483

  7. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  8. Influence of Skin Diseases on Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Martin Drahansky

    2012-01-01

    Full Text Available There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described.

  9. Three-dimensional fingerprint recognition by using convolution neural network

    Science.gov (United States)

    Tian, Qianyu; Gao, Nan; Zhang, Zonghua

    2018-01-01

    With the development of science and technology and the improvement of social information, fingerprint recognition technology has become a hot research direction and been widely applied in many actual fields because of its feasibility and reliability. The traditional two-dimensional (2D) fingerprint recognition method relies on matching feature points. This method is not only time-consuming, but also lost three-dimensional (3D) information of fingerprint, with the fingerprint rotation, scaling, damage and other issues, a serious decline in robustness. To solve these problems, 3D fingerprint has been used to recognize human being. Because it is a new research field, there are still lots of challenging problems in 3D fingerprint recognition. This paper presents a new 3D fingerprint recognition method by using a convolution neural network (CNN). By combining 2D fingerprint and fingerprint depth map into CNN, and then through another CNN feature fusion, the characteristics of the fusion complete 3D fingerprint recognition after classification. This method not only can preserve 3D information of fingerprints, but also solves the problem of CNN input. Moreover, the recognition process is simpler than traditional feature point matching algorithm. 3D fingerprint recognition rate by using CNN is compared with other fingerprint recognition algorithms. The experimental results show that the proposed 3D fingerprint recognition method has good recognition rate and robustness.

  10. An Efficient Reconfigurable Architecture for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Satish S. Bhairannawar

    2016-01-01

    Full Text Available The fingerprint identification is an efficient biometric technique to authenticate human beings in real-time Big Data Analytics. In this paper, we propose an efficient Finite State Machine (FSM based reconfigurable architecture for fingerprint recognition. The fingerprint image is resized, and Compound Linear Binary Pattern (CLBP is applied on fingerprint, followed by histogram to obtain histogram CLBP features. Discrete Wavelet Transform (DWT Level 2 features are obtained by the same methodology. The novel matching score of CLBP is computed using histogram CLBP features of test image and fingerprint images in the database. Similarly, the DWT matching score is computed using DWT features of test image and fingerprint images in the database. Further, the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. The performance parameters such as TSR (Total Success Rate, FAR (False Acceptance Rate, and FRR (False Rejection Rate are computed using fusion scores with correlation matching technique for FVC2004 DB3 Database. The proposed fusion based VLSI architecture is synthesized on Virtex xc5vlx30T-3 FPGA board using Finite State Machine resulting in optimized parameters.

  11. Fingerprint recognition system by use of graph matching

    Science.gov (United States)

    Shen, Wei; Shen, Jun; Zheng, Huicheng

    2001-09-01

    Fingerprint recognition is an important subject in biometrics to identify or verify persons by physiological characteristics, and has found wide applications in different domains. In the present paper, we present a finger recognition system that combines singular points and structures. The principal steps of processing in our system are: preprocessing and ridge segmentation, singular point extraction and selection, graph representation, and finger recognition by graphs matching. Our fingerprint recognition system is implemented and tested for many fingerprint images and the experimental result are satisfactory. Different techniques are used in our system, such as fast calculation of orientation field, local fuzzy dynamical thresholding, algebraic analysis of connections and fingerprints representation and matching by graphs. Wed find that for fingerprint database that is not very large, the recognition rate is very high even without using a prior coarse category classification. This system works well for both one-to-few and one-to-many problems.

  12. Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing.

    Science.gov (United States)

    Yassin, Ali A

    2014-01-01

    Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification.

  13. Enhance Criminal Investigation by Proposed Fingerprint Recognition System

    International Nuclear Information System (INIS)

    Hashem, S.H.; Maolod, A.T.; Mohammad, A.A.

    2014-01-01

    Law enforcement officers and forensic specialists spend hours thinking about how fingerprints solve crimes, and trying to find, collect, record and compare these unique identifiers that can connect a specific person to a specific crime. These individuals understand that a basic human feature that most people take for granted, can be one of the most effective tools in crime solving.This research exploits our previous work to be applicable in criminal investigation field. The present study aims to solve the advance crime by strength fingerprint’s criminal investigation to control the alterations happen intentionally to criminals’ fingerprint. That done by suggest strategy introduce an optimal fingerprint image feature’s vector to the person and then considers it to be stored in database for future matching. Selecting optimal fingerprint feature’s vector strategy deal with considering 10 fingerprints for each criminal person (take the fingerprint in different time and different circumstance of criminal such as finger is dirty, wet, trembling, etc.). Proposal begun with apply a proposed enrollment on all 10 fingerprint for each criminal, the enrollment include the following consequence steps; begin with preprocessing step for each of 10 images including enhancement, then two level of feature extraction (first level to extract arches, whorls, and loops, where second level extract minutiae), after that applying proposed Genetic Algorithm to select optimal fingerprint, master fingerprint, which in our point of view present the most universal image which include more detailed features to recognition. Master fingerprint will be feature’s vector which stored in database. Then apply the proposed matching by testing fingerprints with these stored in database.While, measuring of criminal fingerprint investigation performance by calculating False Reject Rate (FRR)and False Accept Rate (FAR) for the traditional system and the proposed in criminal detection field. The

  14. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    Directory of Open Access Journals (Sweden)

    Yijun Yang

    2015-01-01

    Full Text Available A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  15. Advertisement recognition using mode voting acoustic fingerprint

    Science.gov (United States)

    Fahmi, Reza; Abedi Firouzjaee, Hosein; Janalizadeh Choobbasti, Ali; Mortazavi Najafabadi, S. H. E.; Safavi, Saeid

    2017-12-01

    Emergence of media outlets and public relations tools such as TV, radio and the Internet since the 20th century provided the companies with a good platform for advertising their goods and services. Advertisement recognition is an important task that can help companies measure the efficiency of their advertising campaigns in the market and make it possible to compare their performance with competitors in order to get better business insights. Advertisement recognition is usually performed manually with help of human labor or is done through automated methods that are mainly based on heuristics features, these methods usually lack abilities such as scalability, being able to be generalized and be used in different situations. In this paper, we present an automated method for advertisement recognition based on audio processing method that could make this process fairly simple and eliminate the human factor out of the equation. This method has ultimately been used in Miras information technology in order to monitor 56 TV channels to detect all ad video clips broadcast over some networks.

  16. Improved fingercode alignment for accurate and compact fingerprint recognition

    CSIR Research Space (South Africa)

    Brown, Dane

    2016-05-01

    Full Text Available Alignment for Accurate and Compact Fingerprint Recognition Dane Brown∗† and Karen Bradshaw∗ ∗Department of Computer Science Rhodes University Grahamstown, South Africa †Council for Scientific and Industrial Research Modelling and Digital Sciences Pretoria.... The experimental analysis and results are discussed in Section IV. Section V concludes the paper. II. RELATED STUDIES FingerCode [1] uses circular tessellation of filtered finger- print images centered at the reference point, which results in a circular ROI...

  17. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis

    Science.gov (United States)

    Cheng, Yezeng; Larin, Kirill V.

    2006-12-01

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  18. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Directory of Open Access Journals (Sweden)

    Muhammad Hameed Siddiqi

    2013-12-01

    Full Text Available Over the last decade, human facial expressions recognition (FER has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER.

  19. Hierarchical Recognition Scheme for Human Facial Expression Recognition Systems

    Science.gov (United States)

    Siddiqi, Muhammad Hameed; Lee, Sungyoung; Lee, Young-Koo; Khan, Adil Mehmood; Truc, Phan Tran Ho

    2013-01-01

    Over the last decade, human facial expressions recognition (FER) has emerged as an important research area. Several factors make FER a challenging research problem. These include varying light conditions in training and test images; need for automatic and accurate face detection before feature extraction; and high similarity among different expressions that makes it difficult to distinguish these expressions with a high accuracy. This work implements a hierarchical linear discriminant analysis-based facial expressions recognition (HL-FER) system to tackle these problems. Unlike the previous systems, the HL-FER uses a pre-processing step to eliminate light effects, incorporates a new automatic face detection scheme, employs methods to extract both global and local features, and utilizes a HL-FER to overcome the problem of high similarity among different expressions. Unlike most of the previous works that were evaluated using a single dataset, the performance of the HL-FER is assessed using three publicly available datasets under three different experimental settings: n-fold cross validation based on subjects for each dataset separately; n-fold cross validation rule based on datasets; and, finally, a last set of experiments to assess the effectiveness of each module of the HL-FER separately. Weighted average recognition accuracy of 98.7% across three different datasets, using three classifiers, indicates the success of employing the HL-FER for human FER. PMID:24316568

  20. Combining Biometric Fractal Pattern and Particle Swarm Optimization-Based Classifier for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Chia-Hung Lin

    2010-01-01

    Full Text Available This paper proposes combining the biometric fractal pattern and particle swarm optimization (PSO-based classifier for fingerprint recognition. Fingerprints have arch, loop, whorl, and accidental morphologies, and embed singular points, resulting in the establishment of fingerprint individuality. An automatic fingerprint identification system consists of two stages: digital image processing (DIP and pattern recognition. DIP is used to convert to binary images, refine out noise, and locate the reference point. For binary images, Katz's algorithm is employed to estimate the fractal dimension (FD from a two-dimensional (2D image. Biometric features are extracted as fractal patterns using different FDs. Probabilistic neural network (PNN as a classifier performs to compare the fractal patterns among the small-scale database. A PSO algorithm is used to tune the optimal parameters and heighten the accuracy. For 30 subjects in the laboratory, the proposed classifier demonstrates greater efficiency and higher accuracy in fingerprint recognition.

  1. Security and matching of partial fingerprint recognition systems

    Science.gov (United States)

    Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.

    2004-08-01

    Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).

  2. Fingerprint Recognition using Fuzzy Logic with Triangular Pattern Template

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar

    2006-01-01

    A fingerprint is a pattern of ridges and valleys that exist on the surface of the finger. The uniqueness of a fingerprint is typically determined by the overall pattern of ridges and valleys as well as the local ridge structures e.g., a ridge bifurcation or a ridge ending, which are called minutiae...

  3. Score level fusion scheme based on adaptive local Gabor features for face-iris-fingerprint multimodal biometric

    Science.gov (United States)

    He, Fei; Liu, Yuanning; Zhu, Xiaodong; Huang, Chun; Han, Ye; Chen, Ying

    2014-05-01

    A multimodal biometric system has been considered a promising technique to overcome the defects of unimodal biometric systems. We have introduced a fusion scheme to gain a better understanding and fusion method for a face-iris-fingerprint multimodal biometric system. In our case, we use particle swarm optimization to train a set of adaptive Gabor filters in order to achieve the proper Gabor basic functions for each modality. For a closer analysis of texture information, two different local Gabor features for each modality are produced by the corresponding Gabor coefficients. Next, all matching scores of the two Gabor features for each modality are projected to a single-scalar score via a trained, supported, vector regression model for a final decision. A large-scale dataset is formed to validate the proposed scheme using the Facial Recognition Technology database-fafb and CASIA-V3-Interval together with FVC2004-DB2a datasets. The experimental results demonstrate that as well as achieving further powerful local Gabor features of multimodalities and obtaining better recognition performance by their fusion strategy, our architecture also outperforms some state-of-the-art individual methods and other fusion approaches for face-iris-fingerprint multimodal biometric systems.

  4. Finger-vein and fingerprint recognition based on a feature-level fusion method

    Science.gov (United States)

    Yang, Jinfeng; Hong, Bofeng

    2013-07-01

    Multimodal biometrics based on the finger identification is a hot topic in recent years. In this paper, a novel fingerprint-vein based biometric method is proposed to improve the reliability and accuracy of the finger recognition system. First, the second order steerable filters are used here to enhance and extract the minutiae features of the fingerprint (FP) and finger-vein (FV). Second, the texture features of fingerprint and finger-vein are extracted by a bank of Gabor filter. Third, a new triangle-region fusion method is proposed to integrate all the fingerprint and finger-vein features in feature-level. Thus, the fusion features contain both the finger texture-information and the minutiae triangular geometry structure. Finally, experimental results performed on the self-constructed finger-vein and fingerprint databases are shown that the proposed method is reliable and precise in personal identification.

  5. Similarity score computation for minutiae-based fingerprint recognition

    CSIR Research Space (South Africa)

    Khanyile, NP

    2014-09-01

    Full Text Available This paper identifies and analyses the factors that contribute to the similarity between two sets of minutiae points as well as the probability that two sets of minutiae points were extracted from fingerprints of the same finger. Minutiae...

  6. A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

    Directory of Open Access Journals (Sweden)

    F. Abundiz-Pérez

    2016-01-01

    Full Text Available Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems.

  7. Person recognition using fingerprints and top-view finger images

    Directory of Open Access Journals (Sweden)

    Panyayot Chaikan

    2010-03-01

    Full Text Available Our multimodal biometric system combines fingerprinting with a top-view finger image captured by a CCD camera without user intervention. The greyscale image is preprocessed to enhance its edges, skin furrows, and the nail shape before being manipulated by a bank of oriented filters. A square tessellation is applied to the filtered image to create a feature map, called a NailCode, which is employed in Euclidean distance computations. The NailCode reduces system errors by 17.68% in the verification mode, and by 6.82% in the identification mode.

  8. HPLC fingerprint analysis combined with chemometrics for pattern recognition of ginger.

    Science.gov (United States)

    Feng, Xu; Kong, Weijun; Wei, Jianhe; Ou-Yang, Zhen; Yang, Meihua

    2014-03-01

    Ginger, the fresh rhizome of Zingiber officinale Rosc. (Zingiberaceae), has been used worldwide; however, for a long time, there has been no standard approbated internationally for its quality control. To establish an efficacious and combinational method and pattern recognition technique for quality control of ginger. A simple, accurate and reliable method based on high-performance liquid chromatography with photodiode array (HPLC-PDA) detection was developed for establishing the chemical fingerprints of 10 batches of ginger from different markets in China. The method was validated in terms of precision, reproducibility and stability; and the relative standard deviations were all less than 1.57%. On the basis of this method, the fingerprints of 10 batches of ginger samples were obtained, which showed 16 common peaks. Coupled with similarity evaluation software, the similarities between each fingerprint of the sample and the simulative mean chromatogram were in the range of 0.998-1.000. Then, the chemometric techniques, including similarity analysis, hierarchical clustering analysis and principal component analysis were applied to classify the ginger samples. Consistent results were obtained to show that ginger samples could be successfully classified into two groups. This study revealed that HPLC-PDA method was simple, sensitive and reliable for fingerprint analysis, and moreover, for pattern recognition and quality control of ginger.

  9. Authentication and distinction of Shenmai injection with HPLC fingerprint analysis assisted by pattern recognition techniques

    Directory of Open Access Journals (Sweden)

    Xue-Feng Lu

    2012-10-01

    Full Text Available In this paper, the feasibility and advantages of employing high performance liquid chromatographic (HPLC fingerprints combined with pattern recognition techniques for quality control of Shenmai injection were investigated and demonstrated. The Similarity Evaluation System was employed to evaluate the similarities of samples of Shenmai injection, and the HPLC generated chromatographic data were analyzed using hierarchical clustering analysis (HCA and soft independent modeling of class analogy (SIMCA. Consistent results were obtained to show that the authentic samples and the blended samples were successfully classified by SIMCA, which could be applied to accurate discrimination and quality control of Shenmai injection. Furthermore, samples could also be grouped in accordance with manufacturers. Our results revealed that the developed method has potential perspective for the original discrimination and quality control of Shenmai injection. Keywords: Shenmai injection, High performance liquid chromatography, Fingerprint, Pattern recognition

  10. Clarification of nuclear risk recognition scheme through dialogue forum

    International Nuclear Information System (INIS)

    Yagi, Ekou; Takahashi, Makoto; Kitamura, Masaharu

    2007-01-01

    The design framework and operational guidelines for conducting repetitive dialogue between public and nuclear engineers are described in this paper. An action research project named repetitive dialogue forum has been conducted in two municipalities where nuclear facilities were sited. The qualitative evaluation by public participants indicated that the public trust in the nuclear experts, known as the crucial factor for meaningful communication, was successfully established through the dialogue forum. In addition, the expert showed a marked psychological change from distrust to trust in public. Through a detailed analysis of the comments of the participants raised during the forums, the nuclear risk recognition scheme of the public was clarified. The constituents of the risk recognition scheme about nuclear facilities were identified as follows. The first is related to the technical risk recognition factor including purely technical risk, organizational elements and regulatory elements. The second is the social risk recognition factor including economical and mental elements. The last is the communication factor including the influence of mass media, difficulty in frank communication in local community etc. It became clear that the information provision activities conducted by the government and the nuclear industry were lack of in-depth understanding of actual information needs in the public. Provision of information contents consistent with our observations is recommended for reestablishment of public trust in expert and for more informative dialogical interactions. (author)

  11. Fuzzy tricentric pharmacophore fingerprints. 1. Topological fuzzy pharmacophore triplets and adapted molecular similarity scoring schemes.

    Science.gov (United States)

    Bonachéra, Fanny; Parent, Benjamin; Barbosa, Frédérique; Froloff, Nicolas; Horvath, Dragos

    2006-01-01

    This paper introduces a novel molecular description--topological (2D) fuzzy pharmacophore triplets, 2D-FPT--using the number of interposed bonds as the measure of separation between the atoms representing pharmacophore types (hydrophobic, aromatic, hydrogen-bond donor and acceptor, cation, and anion). 2D-FPT features three key improvements with respect to the state-of-the-art pharmacophore fingerprints: (1) The first key novelty is fuzzy mapping of molecular triplets onto the basis set of pharmacophore triplets: unlike in the binary scheme where an atom triplet is set to highlight the bit of a single, best-matching basis triplet, the herein-defined fuzzy approach allows for gradual mapping of each atom triplet onto several related basis triplets, thus minimizing binary classification artifacts. (2) The second innovation is proteolytic equilibrium dependence, by explicitly considering all of the conjugated acids and bases (microspecies). 2D-FPTs are concentration-weighted (as predicted at pH=7.4) averages of microspecies fingerprints. Therefore, small structural modifications, not affecting the overall pharmacophore pattern (in the sense of classical rule-based assignment), but nevertheless triggering a pKa shift, will have a major impact on 2D-FPT. Pairs of almost identical compounds with significantly differing activities ("activity cliffs" in classical descriptor spaces) were in many cases predictable by 2D-FPT. (3) The third innovation is a new similarity scoring formula, acknowledging that the simultaneous absence of a triplet in two molecules is a less-constraining indicator of similarity than its simultaneous presence. It displays excellent neighborhood behavior, outperforming 2D or 3D two-point pharmacophore descriptors or chemical fingerprints. The 2D-FPT calculator was developed using the chemoinformatics toolkit of ChemAxon (www.chemaxon.com).

  12. Comparative study of multimodal biometric recognition by fusion of iris and fingerprint.

    Science.gov (United States)

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results.

  13. Comparative Study of Multimodal Biometric Recognition by Fusion of Iris and Fingerprint

    Directory of Open Access Journals (Sweden)

    Houda Benaliouche

    2014-01-01

    Full Text Available This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results.

  14. Comparative Study of Multimodal Biometric Recognition by Fusion of Iris and Fingerprint

    Science.gov (United States)

    Benaliouche, Houda; Touahria, Mohamed

    2014-01-01

    This research investigates the comparative performance from three different approaches for multimodal recognition of combined iris and fingerprints: classical sum rule, weighted sum rule, and fuzzy logic method. The scores from the different biometric traits of iris and fingerprint are fused at the matching score and the decision levels. The scores combination approach is used after normalization of both scores using the min-max rule. Our experimental results suggest that the fuzzy logic method for the matching scores combinations at the decision level is the best followed by the classical weighted sum rule and the classical sum rule in order. The performance evaluation of each method is reported in terms of matching time, error rates, and accuracy after doing exhaustive tests on the public CASIA-Iris databases V1 and V2 and the FVC 2004 fingerprint database. Experimental results prior to fusion and after fusion are presented followed by their comparison with related works in the current literature. The fusion by fuzzy logic decision mimics the human reasoning in a soft and simple way and gives enhanced results. PMID:24605065

  15. [Research on the application of grey system theory in the pattern recognition for chromatographic fingerprints of traditional Chinese medicine].

    Science.gov (United States)

    Wei, Hang; Lin, Li; Zhang, Yuan; Wang, Lianjing; Chen, Qinqun

    2013-02-01

    A model based on grey system theory was proposed for pattern recognition in chromatographic fingerprints (CF) of traditional Chinese medicine (TCM). The grey relational grade among the data series of each testing CF and the ideal CF was obtained by entropy and norm respectively, then the principle of "maximal matching degree" was introduced to make judgments, so as to achieve the purpose of variety identification and quality evaluation. A satisfactory result in the high performance liquid chromatographic (HPLC) analysis of 56 batches of different varieties of Exocarpium Citrus Grandis was achieved with this model. The errors in the chromatographic fingerprint analysis caused by traditional similarity method or grey correlation method were overcome, as the samples of Citrus grandis 'Tomentosa' and Citrus grandis (L.) Osbeck were correctly distinguished in the experiment. Furthermore in the study on the variety identification of Citrus grandis 'Tomentosa', the recognition rates were up to 92.85%, although the types and the contents of the chemical compositions of the samples were very close. At the same time, the model had the merits of low computation complexity and easy operation by computer programming. The research indicated that the grey system theory has good applicability to pattern recognition in the chromatographic fingerprints of TCM.

  16. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition.

    Science.gov (United States)

    Galbally, Javier; Marcel, Sébastien; Fierrez, Julian

    2014-02-01

    To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed sample is a significant problem in biometric authentication, which requires the development of new and efficient protection measures. In this paper, we present a novel software-based fake detection method that can be used in multiple biometric systems to detect different types of fraudulent access attempts. The objective of the proposed system is to enhance the security of biometric recognition frameworks, by adding liveness assessment in a fast, user-friendly, and non-intrusive manner, through the use of image quality assessment. The proposed approach presents a very low degree of complexity, which makes it suitable for real-time applications, using 25 general image quality features extracted from one image (i.e., the same acquired for authentication purposes) to distinguish between legitimate and impostor samples. The experimental results, obtained on publicly available data sets of fingerprint, iris, and 2D face, show that the proposed method is highly competitive compared with other state-of-the-art approaches and that the analysis of the general image quality of real biometric samples reveals highly valuable information that may be very efficiently used to discriminate them from fake traits.

  17. Re-docking scheme for generating near-native protein complexes by assembling residue interaction fingerprints.

    Directory of Open Access Journals (Sweden)

    Nobuyuki Uchikoga

    Full Text Available Interaction profile method is a useful method for processing rigid-body docking. After the docking process, the resulting set of docking poses could be classified by calculating similarities among them using these interaction profiles to search for near-native poses. However, there are some cases where the near-native poses are not included in this set of docking poses even when the bound-state structures are used. Therefore, we have developed a method for generating near-native docking poses by introducing a re-docking process. We devised a method for calculating the profile of interaction fingerprints by assembling protein complexes after determining certain core-protein complexes. For our analysis, we used 44 bound-state protein complexes selected from the ZDOCK benchmark dataset ver. 2.0, including some protein pairs none of which generated near-native poses in the docking process. Consequently, after the re-docking process we obtained profiles of interaction fingerprints, some of which yielded near-native poses. The re-docking process involved searching for possible docking poses in a restricted area using the profile of interaction fingerprints. If the profile includes interactions identical to those in the native complex, we obtained near-native docking poses. Accordingly, near-native poses were obtained for all bound-state protein complexes examined here. Application of interaction fingerprints to the re-docking process yielded structures with more native interactions, even when a docking pose, obtained following the initial docking process, contained only a small number of native amino acid interactions. Thus, utilization of the profile of interaction fingerprints in the re-docking process yielded more near-native poses.

  18. Re-docking scheme for generating near-native protein complexes by assembling residue interaction fingerprints.

    Science.gov (United States)

    Uchikoga, Nobuyuki; Matsuzaki, Yuri; Ohue, Masahito; Hirokawa, Takatsugu; Akiyama, Yutaka

    2013-01-01

    Interaction profile method is a useful method for processing rigid-body docking. After the docking process, the resulting set of docking poses could be classified by calculating similarities among them using these interaction profiles to search for near-native poses. However, there are some cases where the near-native poses are not included in this set of docking poses even when the bound-state structures are used. Therefore, we have developed a method for generating near-native docking poses by introducing a re-docking process. We devised a method for calculating the profile of interaction fingerprints by assembling protein complexes after determining certain core-protein complexes. For our analysis, we used 44 bound-state protein complexes selected from the ZDOCK benchmark dataset ver. 2.0, including some protein pairs none of which generated near-native poses in the docking process. Consequently, after the re-docking process we obtained profiles of interaction fingerprints, some of which yielded near-native poses. The re-docking process involved searching for possible docking poses in a restricted area using the profile of interaction fingerprints. If the profile includes interactions identical to those in the native complex, we obtained near-native docking poses. Accordingly, near-native poses were obtained for all bound-state protein complexes examined here. Application of interaction fingerprints to the re-docking process yielded structures with more native interactions, even when a docking pose, obtained following the initial docking process, contained only a small number of native amino acid interactions. Thus, utilization of the profile of interaction fingerprints in the re-docking process yielded more near-native poses.

  19. Recognition of explosives fingerprints on objects for courier services using machine learning methods and laser-induced breakdown spectroscopy.

    Science.gov (United States)

    Moros, J; Serrano, J; Gallego, F J; Macías, J; Laserna, J J

    2013-06-15

    During recent years laser-induced breakdown spectroscopy (LIBS) has been considered one of the techniques with larger ability for trace detection of explosives. However, despite of the high sensitivity exhibited for this application, LIBS suffers from a limited selectivity due to difficulties in assigning the molecular origin of the spectral emissions observed. This circumstance makes the recognition of fingerprints a latent challenging problem. In the present manuscript the sorting of six explosives (chloratite, ammonal, DNT, TNT, RDX and PETN) against a broad list of potential harmless interferents (butter, fuel oil, hand cream, olive oil, …), all of them in the form of fingerprints deposited on the surfaces of objects for courier services, has been carried out. When LIBS information is processed through a multi-stage architecture algorithm built from a suitable combination of 3 learning classifiers, an unknown fingerprint may be labeled into a particular class. Neural network classifiers trained by the Levenberg-Marquardt rule were decided within 3D scatter plots projected onto the subspace of the most useful features extracted from the LIBS spectra. Experimental results demonstrate that the presented algorithm sorts fingerprints according to their hazardous character, although its spectral information is virtually identical in appearance, with rates of false negatives and false positives not beyond of 10%. These reported achievements mean a step forward in the technology readiness level of LIBS for this complex application related to defense, homeland security and force protection. Copyright © 2013 Elsevier B.V. All rights reserved.

  20. Carbon nuclear magnetic resonance spectroscopic fingerprinting of commercial gasoline: pattern-recognition analyses for screening quality control purposes.

    Science.gov (United States)

    Flumignan, Danilo Luiz; Boralle, Nivaldo; Oliveira, José Eduardo de

    2010-06-30

    In this work, the combination of carbon nuclear magnetic resonance ((13)C NMR) fingerprinting with pattern-recognition analyses provides an original and alternative approach to screening commercial gasoline quality. Soft Independent Modelling of Class Analogy (SIMCA) was performed on spectroscopic fingerprints to classify representative commercial gasoline samples, which were selected by Hierarchical Cluster Analyses (HCA) over several months in retails services of gas stations, into previously quality-defined classes. Following optimized (13)C NMR-SIMCA algorithm, sensitivity values were obtained in the training set (99.0%), with leave-one-out cross-validation, and external prediction set (92.0%). Governmental laboratories could employ this method as a rapid screening analysis to discourage adulteration practices. Copyright 2010 Elsevier B.V. All rights reserved.

  1. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  2. An enhanced feature set for pattern recognition based contrast enhancement of contact-less captured latent fingerprints in digitized crime scene forensics

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2014-02-01

    In crime scene forensics latent fingerprints are found on various substrates. Nowadays primarily physical or chemical preprocessing techniques are applied for enhancing the visibility of the fingerprint trace. In order to avoid altering the trace it has been shown that contact-less sensors offer a non-destructive acquisition approach. Here, the exploitation of fingerprint or substrate properties and the utilization of signal processing techniques are an essential requirement to enhance the fingerprint visibility. However, especially the optimal sensory is often substrate-dependent. An enhanced generic pattern recognition based contrast enhancement approach for scans of a chromatic white light sensor is introduced in Hildebrandt et al.1 using statistical, structural and Benford's law2 features for blocks of 50 micron. This approach achieves very good results for latent fingerprints on cooperative, non-textured, smooth substrates. However, on textured and structured substrates the error rates are very high and the approach thus unsuitable for forensic use cases. We propose the extension of the feature set with semantic features derived from known Gabor filter based exemplar fingerprint enhancement techniques by suggesting an Epsilon-neighborhood of each block in order to achieve an improved accuracy (called fingerprint ridge orientation semantics). Furthermore, we use rotation invariant Hu moments as an extension of the structural features and two additional preprocessing methods (separate X- and Y Sobel operators). This results in a 408-dimensional feature space. In our experiments we investigate and report the recognition accuracy for eight substrates, each with ten latent fingerprints: white furniture surface, veneered plywood, brushed stainless steel, aluminum foil, "Golden-Oak" veneer, non-metallic matte car body finish, metallic car body finish and blued metal. In comparison to Hildebrandt et al.,1 our evaluation shows a significant reduction of the error rates

  3. A Robust Multimodal Bio metric Authentication Scheme with Voice and Face Recognition

    International Nuclear Information System (INIS)

    Kasban, H.

    2017-01-01

    This paper proposes a multimodal biometric scheme for human authentication based on fusion of voice and face recognition. For voice recognition, three categories of features (statistical coefficients, cepstral coefficients and voice timbre) are used and compared. The voice identification modality is carried out using Gaussian Mixture Model (GMM). For face recognition, three recognition methods (Eigenface, Linear Discriminate Analysis (LDA), and Gabor filter) are used and compared. The combination of voice and face biometrics systems into a single multimodal biometrics system is performed using features fusion and scores fusion. This study shows that the best results are obtained using all the features (cepstral coefficients, statistical coefficients and voice timbre features) for voice recognition, LDA face recognition method and scores fusion for the multimodal biometrics system

  4. Binary spectral minutiae representation with multi-sample fusion for fingerprint recognition

    NARCIS (Netherlands)

    Xu, H.; Veldhuis, Raymond N.J.

    Biometric fusion is the approach to improve the biometric system performance by combining multiple sources of biometric information. The binary spectral minutiae representation is a method to represent a fingerprint minutiae set as a fixed-length binary string. This binary representation has the

  5. SU-E-I-75: Development of New Biological Fingerprints for Patient Recognition to Identify Misfiled Images in a PACS Server

    International Nuclear Information System (INIS)

    Shimizu, Y; Yoon, Y; Iwase, K; Yasumatsu, S; Matsunobu, Y; Morishita, J

    2015-01-01

    Purpose: We are trying to develop an image-searching technique to identify misfiled images in a picture archiving and communication system (PACS) server by using five biological fingerprints: the whole lung field, cardiac shadow, superior mediastinum, lung apex, and right lower lung. Each biological fingerprint in a chest radiograph includes distinctive anatomical structures to identify misfiled images. The whole lung field was less effective for evaluating the similarity between two images than the other biological fingerprints. This was mainly due to the variation in the positioning for chest radiographs. The purpose of this study is to develop new biological fingerprints that could reduce influence of differences in the positioning for chest radiography. Methods: Two hundred patients were selected randomly from our database (36,212 patients). These patients had two images each (current and previous images). Current images were used as the misfiled images in this study. A circumscribed rectangular area of the lung and the upper half of the rectangle were selected automatically as new biological fingerprints. These biological fingerprints were matched to all previous images in the database. The degrees of similarity between the two images were calculated for the same and different patients. The usefulness of new the biological fingerprints for automated patient recognition was examined in terms of receiver operating characteristic (ROC) analysis. Results: Area under the ROC curves (AUCs) for the circumscribed rectangle of the lung, upper half of the rectangle, and whole lung field were 0.980, 0.994, and 0.950, respectively. The new biological fingerprints showed better performance in identifying the patients correctly than the whole lung field. Conclusion: We have developed new biological fingerprints: circumscribed rectangle of the lung and upper half of the rectangle. These new biological fingerprints would be useful for automated patient identification system

  6. SU-E-I-75: Development of New Biological Fingerprints for Patient Recognition to Identify Misfiled Images in a PACS Server

    Energy Technology Data Exchange (ETDEWEB)

    Shimizu, Y; Yoon, Y; Iwase, K; Yasumatsu, S; Matsunobu, Y [Department of Health Sciences, Graduate School of Medical Sciences, Kyushu University, Fukuoka, JP (Japan); Morishita, J [Department of Health Sciences, Faculty of Medical Sciences, Kyushu University, Fukuoka, JP (Japan)

    2015-06-15

    Purpose: We are trying to develop an image-searching technique to identify misfiled images in a picture archiving and communication system (PACS) server by using five biological fingerprints: the whole lung field, cardiac shadow, superior mediastinum, lung apex, and right lower lung. Each biological fingerprint in a chest radiograph includes distinctive anatomical structures to identify misfiled images. The whole lung field was less effective for evaluating the similarity between two images than the other biological fingerprints. This was mainly due to the variation in the positioning for chest radiographs. The purpose of this study is to develop new biological fingerprints that could reduce influence of differences in the positioning for chest radiography. Methods: Two hundred patients were selected randomly from our database (36,212 patients). These patients had two images each (current and previous images). Current images were used as the misfiled images in this study. A circumscribed rectangular area of the lung and the upper half of the rectangle were selected automatically as new biological fingerprints. These biological fingerprints were matched to all previous images in the database. The degrees of similarity between the two images were calculated for the same and different patients. The usefulness of new the biological fingerprints for automated patient recognition was examined in terms of receiver operating characteristic (ROC) analysis. Results: Area under the ROC curves (AUCs) for the circumscribed rectangle of the lung, upper half of the rectangle, and whole lung field were 0.980, 0.994, and 0.950, respectively. The new biological fingerprints showed better performance in identifying the patients correctly than the whole lung field. Conclusion: We have developed new biological fingerprints: circumscribed rectangle of the lung and upper half of the rectangle. These new biological fingerprints would be useful for automated patient identification system

  7. Low-effort place recognition with WiFi fingerprints using deep learning

    OpenAIRE

    Nowicki, Michał; Wietrzykowski, Jan

    2016-01-01

    Using WiFi signals for indoor localization is the main localization modality of the existing personal indoor localization systems operating on mobile devices. WiFi fingerprinting is also used for mobile robots, as WiFi signals are usually available indoors and can provide rough initial position estimate or can be used together with other positioning systems. Currently, the best solutions rely on filtering, manual data analysis, and time-consuming parameter tuning to achieve reliable and accur...

  8. Gabor filter based fingerprint image enhancement

    Science.gov (United States)

    Wang, Jin-Xiang

    2013-03-01

    Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.

  9. Extended pattern recognition scheme for self-learning kinetic Monte Carlo simulations

    International Nuclear Information System (INIS)

    Shah, Syed Islamuddin; Nandipati, Giridhar; Kara, Abdelkader; Rahman, Talat S

    2012-01-01

    We report the development of a pattern recognition scheme that takes into account both fcc and hcp adsorption sites in performing self-learning kinetic Monte Carlo (SLKMC-II) simulations on the fcc(111) surface. In this scheme, the local environment of every under-coordinated atom in an island is uniquely identified by grouping fcc sites, hcp sites and top-layer substrate atoms around it into hexagonal rings. As the simulation progresses, all possible processes, including those such as shearing, reptation and concerted gliding, which may involve fcc-fcc, hcp-hcp and fcc-hcp moves are automatically found, and their energetics calculated on the fly. In this article we present the results of applying this new pattern recognition scheme to the self-diffusion of 9-atom islands (M 9 ) on M(111), where M = Cu, Ag or Ni.

  10. Recognition of Activities of Daily Living Based on Environmental Analyses Using Audio Fingerprinting Techniques: A Systematic Review

    Directory of Open Access Journals (Sweden)

    Ivan Miguel Pires

    2018-01-01

    Full Text Available An increase in the accuracy of identification of Activities of Daily Living (ADL is very important for different goals of Enhanced Living Environments and for Ambient Assisted Living (AAL tasks. This increase may be achieved through identification of the surrounding environment. Although this is usually used to identify the location, ADL recognition can be improved with the identification of the sound in that particular environment. This paper reviews audio fingerprinting techniques that can be used with the acoustic data acquired from mobile devices. A comprehensive literature search was conducted in order to identify relevant English language works aimed at the identification of the environment of ADLs using data acquired with mobile devices, published between 2002 and 2017. In total, 40 studies were analyzed and selected from 115 citations. The results highlight several audio fingerprinting techniques, including Modified discrete cosine transform (MDCT, Mel-frequency cepstrum coefficients (MFCC, Principal Component Analysis (PCA, Fast Fourier Transform (FFT, Gaussian mixture models (GMM, likelihood estimation, logarithmic moduled complex lapped transform (LMCLT, support vector machine (SVM, constant Q transform (CQT, symmetric pairwise boosting (SPB, Philips robust hash (PRH, linear discriminant analysis (LDA and discrete cosine transform (DCT.

  11. Smartphone-Based Patients' Activity Recognition by Using a Self-Learning Scheme for Medical Monitoring.

    Science.gov (United States)

    Guo, Junqi; Zhou, Xi; Sun, Yunchuan; Ping, Gong; Zhao, Guoxing; Li, Zhuorong

    2016-06-01

    Smartphone based activity recognition has recently received remarkable attention in various applications of mobile health such as safety monitoring, fitness tracking, and disease prediction. To achieve more accurate and simplified medical monitoring, this paper proposes a self-learning scheme for patients' activity recognition, in which a patient only needs to carry an ordinary smartphone that contains common motion sensors. After the real-time data collection though this smartphone, we preprocess the data using coordinate system transformation to eliminate phone orientation influence. A set of robust and effective features are then extracted from the preprocessed data. Because a patient may inevitably perform various unpredictable activities that have no apriori knowledge in the training dataset, we propose a self-learning activity recognition scheme. The scheme determines whether there are apriori training samples and labeled categories in training pools that well match with unpredictable activity data. If not, it automatically assembles these unpredictable samples into different clusters and gives them new category labels. These clustered samples combined with the acquired new category labels are then merged into the training dataset to reinforce recognition ability of the self-learning model. In experiments, we evaluate our scheme using the data collected from two postoperative patient volunteers, including six labeled daily activities as the initial apriori categories in the training pool. Experimental results demonstrate that the proposed self-learning scheme for activity recognition works very well for most cases. When there exist several types of unseen activities without any apriori information, the accuracy reaches above 80 % after the self-learning process converges.

  12. Improvement of an algorithm for recognition of liveness using perspiration in fingerprint devices

    Science.gov (United States)

    Parthasaradhi, Sujan T.; Derakhshani, Reza; Hornak, Lawrence A.; Schuckers, Stephanie C.

    2004-08-01

    Previous work in our laboratory and others have demonstrated that spoof fingers made of a variety of materials including silicon, Play-Doh, clay, and gelatin (gummy finger) can be scanned and verified when compared to a live enrolled finger. Liveness, i.e. to determine whether the introduced biometric is coming from a live source, has been suggested as a means to circumvent attacks using spoof fingers. We developed a new liveness method based on perspiration changes in the fingerprint image. Recent results showed approximately 90% classification rate using different classification methods for various technologies including optical, electro-optical, and capacitive DC, a shorter time window and a diverse dataset. This paper focuses on improvement of the live classification rate by using a weight decay method during the training phase in order to improve the generalization and reduce the variance of the neural network based classifier. The dataset included fingerprint images from 33 live subjects, 33 spoofs created with dental impression material and Play-Doh, and fourteen cadaver fingers. 100% live classification was achieved with 81.8 to 100% spoof classification, depending on the device technology. The weight-decay method improves upon past reports by increasing the live and spoof classification rate.

  13. Two dimensional molecular electronics spectroscopy for molecular fingerprinting, DNA sequencing, and cancerous DNA recognition.

    Science.gov (United States)

    Rajan, Arunkumar Chitteth; Rezapour, Mohammad Reza; Yun, Jeonghun; Cho, Yeonchoo; Cho, Woo Jong; Min, Seung Kyu; Lee, Geunsik; Kim, Kwang S

    2014-02-25

    Laser-driven molecular spectroscopy of low spatial resolution is widely used, while electronic current-driven molecular spectroscopy of atomic scale resolution has been limited because currents provide only minimal information. However, electron transmission of a graphene nanoribbon on which a molecule is adsorbed shows molecular fingerprints of Fano resonances, i.e., characteristic features of frontier orbitals and conformations of physisorbed molecules. Utilizing these resonance profiles, here we demonstrate two-dimensional molecular electronics spectroscopy (2D MES). The differential conductance with respect to bias and gate voltages not only distinguishes different types of nucleobases for DNA sequencing but also recognizes methylated nucleobases which could be related to cancerous cell growth. This 2D MES could open an exciting field to recognize single molecule signatures at atomic resolution. The advantages of the 2D MES over the one-dimensional (1D) current analysis can be comparable to those of 2D NMR over 1D NMR analysis.

  14. Use of pattern recognition for unaliasing simultaneously acquired slices in simultaneous multislice MR fingerprinting.

    Science.gov (United States)

    Jiang, Yun; Ma, Dan; Bhat, Himanshu; Ye, Huihui; Cauley, Stephen F; Wald, Lawrence L; Setsompop, Kawin; Griswold, Mark A

    2017-11-01

    The purpose of this study is to accelerate an MR fingerprinting (MRF) acquisition by using a simultaneous multislice method. A multiband radiofrequency (RF) pulse was designed to excite two slices with different flip angles and phases. The signals of two slices were driven to be as orthogonal as possible. The mixed and undersampled MRF signal was matched to two dictionaries to retrieve T 1 and T 2 maps of each slice. Quantitative results from the proposed method were validated with the gold-standard spin echo methods in a phantom. T 1 and T 2 maps of in vivo human brain from two simultaneously acquired slices were also compared to the results of fast imaging with steady-state precession based MRF method (MRF-FISP) with a single-band RF excitation. The phantom results showed that the simultaneous multislice imaging MRF-FISP method quantified the relaxation properties accurately compared to the gold-standard spin echo methods. T 1 and T 2 values of in vivo brain from the proposed method also matched the results from the normal MRF-FISP acquisition. T 1 and T 2 values can be quantified at a multiband acceleration factor of two using our proposed acquisition even in a single-channel receive coil. Further acceleration could be achieved by combining this method with parallel imaging or iterative reconstruction. Magn Reson Med 78:1870-1876, 2017. © 2016 International Society for Magnetic Resonance in Medicine. © 2016 International Society for Magnetic Resonance in Medicine.

  15. Recognition of beer brand based on multivariate analysis of volatile fingerprint.

    Science.gov (United States)

    Cajka, Tomas; Riddellova, Katerina; Tomaniova, Monika; Hajslova, Jana

    2010-06-18

    Automated head-space solid-phase microextraction (HS-SPME)-based sampling procedure, coupled to gas chromatography-time-of-flight mass spectrometry (GC-TOFMS), was developed and employed for obtaining of fingerprints (GC profiles) of beer volatiles. In total, 265 speciality beer samples were collected over a 1-year period with the aim to distinguish, based on analytical (profiling) data, (i) the beers labelled as Rochefort 8; (ii) a group consisting of Rochefort 6, 8, 10 beers; and (iii) Trappist beers. For the chemometric evaluation of the data, partial least squares discriminant analysis (PLS-DA), linear discriminant analysis (LDA), and artificial neural networks with multilayer perceptrons (ANN-MLP) were tested. The best prediction ability was obtained for the model that distinguished a group of Rochefort 6, 8, 10 beers from the rest of beers. In this case, all chemometric tools employed provided 100% correct classification. Slightly worse prediction abilities were achieved for the models "Trappist vs. non-Trappist beers" with the values of 93.9% (PLS-DA), 91.9% (LDA) and 97.0% (ANN-MLP) and "Rochefort 8 vs. the rest" with the values of 87.9% (PLS-DA) and 84.8% (LDA) and 93.9% (ANN-MLP). In addition to chromatographic profiling, also the potential of direct coupling of SPME (extraction/pre-concentration device) with high-resolution TOFMS employing a direct analysis in real time (DART) ion source has been demonstrated as a challenging profiling approach. Copyright (c) 2010 Elsevier B.V. All rights reserved.

  16. An Unsupervised Approach to Activity Recognition and Segmentation based on Object-Use Fingerprints

    DEFF Research Database (Denmark)

    Gu, Tao; Chen, Shaxun; Tao, Xianping

    2010-01-01

    Human activity recognition is an important task which has many potential applications. In recent years, researchers from pervasive computing are interested in deploying on-body sensors to collect observations and applying machine learning techniques to model and recognize activities. Supervised...... machine learning techniques typically require an appropriate training process in which training data need to be labeled manually. In this paper, we propose an unsupervised approach based on object-use fingerprints to recognize activities without human labeling. We show how to build our activity models...... a trace and detect the boundary of any two adjacent activities. We develop a wearable RFID system and conduct a real-world trace collection done by seven volunteers in a smart home over a period of 2 weeks. We conduct comprehensive experimental evaluations and comparison study. The results show that our...

  17. Method for modeling post-mortem biometric 3D fingerprints

    Science.gov (United States)

    Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.

    2016-05-01

    Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.

  18. Reference point detection for improved fingerprint matching

    NARCIS (Netherlands)

    Ignatenko, T.; Kalker, A.A.C.M.; Veen, van der M.; Bazen, A.; Delp, E.J.; Wong, P.W.

    2006-01-01

    One of the important stages of fingerprint recognition is the registration of the fingerprints with respect to the original template. This is not a straightforward task as fingerprint images may have been subject to rotations and translations. Popular techniques for fingerprint registration use a

  19. 2013 MARS – Refresher presentation | General principles of the Merit, Appraisal and Recognition Scheme

    CERN Multimedia

    2013-01-01

    Staff members are invited to attend one of the three following information sessions that shall outline the general principles of the 2013 annual Merit, Appraisal and Recognition Scheme (MARS).   Monday 14 January at 10:00-11:30 – Filtration Plant (222-R-001) Thursday 17 January at 10:00-11:30 – Kjell Johnsen Auditorium (30-7-018) Monday 21 January at 10:00-11:30 - BE Amphitheatre Prévessin (864-1-D02)   General information on the MARS exercise may also be found in the CERN admin e-guide: https://admin-eguide.web.cern.ch/admin-eguide/mars/mars.asp. Human Resources Department Tel. 72728

  20. 2011 Mars - Refresher presentation - General principles of the Merit, Appraisal and Recognition Scheme

    CERN Multimedia

    HR Department

    2010-01-01

    Staff members are invited to attend one of the following three information sessions that shall outline the general principles of the 2011 annual Merit, Appraisal and Recognition Scheme (MARS). Monday 10 January at 16:00-17:00 BE Auditorium Prévessin (864-1-D-02) – French;   Tuesday 11 January at 15:00-16:00 – Council Chamber (503-1-001) – English;   Thursday 13 January at 15:00-16:00 - Kjell Johnsen Auditorium (30-7-018) – French. General information on the MARS exercise may also be found on the Human Resources website: https://hr-eguide.web.cern.ch/hr-eguide/mars/mars.asp Tel. 70674 / 72728

  1. Iris image recognition wavelet filter-banks based iris feature extraction schemes

    CERN Document Server

    Rahulkar, Amol D

    2014-01-01

    This book provides the new results in wavelet filter banks based feature extraction, and the classifier in the field of iris image recognition. It provides the broad treatment on the design of separable, non-separable wavelets filter banks, and the classifier. The design techniques presented in the book are applied on iris image analysis for person authentication. This book also brings together the three strands of research (wavelets, iris image analysis, and classifier). It compares the performance of the presented techniques with state-of-the-art available schemes. This book contains the compilation of basic material on the design of wavelets that avoids reading many different books. Therefore, it provide an easier path for the new-comers, researchers to master the contents. In addition, the designed filter banks and classifier can also be effectively used than existing filter-banks in many signal processing applications like pattern classification, data-compression, watermarking, denoising etc.  that will...

  2. Off-lattice pattern recognition scheme for kinetic Monte Carlo simulations

    International Nuclear Information System (INIS)

    Nandipati, Giridhar; Kara, Abdelkader; Shah, Syed Islamuddin; Rahman, Talat S.

    2012-01-01

    We report the development of a pattern-recognition scheme for the off-lattice self-learning kinetic Monte Carlo (KMC) method, one that is simple and flexible enough that it can be applied to all types of surfaces. In this scheme, to uniquely identify the local environment and associated processes involving three-dimensional (3D) motion of an atom or atoms, space around a central atom is divided into 3D rectangular boxes. The dimensions and the number of 3D boxes are determined by the accuracy with which a process needs to be identified and a process is described as the central atom moving to a neighboring vacant box accompanied by the motion of any other atom or atoms in its surrounding boxes. As a test of this method to we apply it to examine the decay of 3D Cu islands on the Cu(100) and to the surface diffusion of a Cu monomer and a dimer on Cu(111) and compare the results and computational efficiency to those available in the literature.

  3. A novel patterning control strategy based on real-time fingerprint recognition and adaptive wafer level scanner optimization

    Science.gov (United States)

    Cekli, Hakki Ergun; Nije, Jelle; Ypma, Alexander; Bastani, Vahid; Sonntag, Dag; Niesing, Henk; Zhang, Linmiao; Ullah, Zakir; Subramony, Venky; Somasundaram, Ravin; Susanto, William; Matsunobu, Masazumi; Johnson, Jeff; Tabery, Cyrus; Lin, Chenxi; Zou, Yi

    2018-03-01

    In addition to lithography process and equipment induced variations, processes like etching, annealing, film deposition and planarization exhibit variations, each having their own intrinsic characteristics and leaving an effect, a `fingerprint', on the wafers. With ever tighter requirements for CD and overlay, controlling these process induced variations is both increasingly important and increasingly challenging in advanced integrated circuit (IC) manufacturing. For example, the on-product overlay (OPO) requirement for future nodes is approaching process induced variance to become extremely small. Process variance control is seen as an bottleneck to further shrink which drives the need for more sophisticated process control strategies. In this context we developed a novel `computational process control strategy' which provides the capability of proactive control of each individual wafer with aim to maximize the yield, without introducing a significant impact on metrology requirements, cycle time or productivity. The complexity of the wafer process is approached by characterizing the full wafer stack building a fingerprint library containing key patterning performance parameters like Overlay, Focus, etc. Historical wafer metrology is decomposed into dominant fingerprints using Principal Component Analysis. By associating observed fingerprints with their origin e.g. process steps, tools and variables, we can give an inline assessment of the strength and origin of the fingerprints on every wafer. Once the fingerprint library is established, a wafer specific fingerprint correction recipes can be determined based on its processing history. Data science techniques are used in real-time to ensure that the library is adaptive. To realize this concept, ASML TWINSCAN scanners play a vital role with their on-board full wafer detection and exposure correction capabilities. High density metrology data is created by the scanner for each wafer and on every layer during the

  4. Fingerprint matching with optical coherence tomography

    CSIR Research Space (South Africa)

    Moolla, Y

    2015-12-01

    Full Text Available Fingerprint recognition is an important security technique with a steadily growing usage for the identification and verification of individuals. However, current fingerprint acquisition systems have certain disadvantages, which include...

  5. Anti-spoof touchless 3D fingerprint recognition system using single shot fringe projection and biospeckle analysis

    Science.gov (United States)

    Chatterjee, Amit; Bhatia, Vimal; Prakash, Shashi

    2017-08-01

    Fingerprint is a unique, un-alterable and easily collected biometric of a human being. Although it is a 3D biological characteristic, traditional methods are designed to provide only a 2D image. This touch based mapping of 3D shape to 2D image losses information and leads to nonlinear distortions. Moreover, as only topographic details are captured, conventional systems are potentially vulnerable to spoofing materials (e.g. artificial fingers, dead fingers, false prints, etc.). In this work, we demonstrate an anti-spoof touchless 3D fingerprint detection system using a combination of single shot fringe projection and biospeckle analysis. For fingerprint detection using fringe projection, light from a low power LED source illuminates a finger through a sinusoidal grating. The fringe pattern modulated because of features on the fingertip is captured using a CCD camera. Fourier transform method based frequency filtering is used for the reconstruction of 3D fingerprint from the captured fringe pattern. In the next step, for spoof detection using biospeckle analysis a visuo-numeric algorithm based on modified structural function and non-normalized histogram is proposed. High activity biospeckle patterns are generated because of interaction of collimated laser light with internal fluid flow of the real finger sample. This activity reduces abruptly in case of layered fake prints, and is almost absent in dead or fake fingers. Furthermore, the proposed setup is fast, low-cost, involves non-mechanical scanning and is highly stable.

  6. Does Kaniso activate CASINO?: input coding schemes and phonology in visual-word recognition.

    Science.gov (United States)

    Acha, Joana; Perea, Manuel

    2010-01-01

    Most recent input coding schemes in visual-word recognition assume that letter position coding is orthographic rather than phonological in nature (e.g., SOLAR, open-bigram, SERIOL, and overlap). This assumption has been drawn - in part - by the fact that the transposed-letter effect (e.g., caniso activates CASINO) seems to be (mostly) insensitive to phonological manipulations (e.g., Perea & Carreiras, 2006, 2008; Perea & Pérez, 2009). However, one could argue that the lack of a phonological effect in prior research was due to the fact that the manipulation always occurred in internal letter positions - note that phonological effects tend to be stronger for the initial syllable (Carreiras, Ferrand, Grainger, & Perea, 2005). To reexamine this issue, we conducted a masked priming lexical decision experiment in which we compared the priming effect for transposed-letter pairs (e.g., caniso-CASINO vs. caviro-CASINO) and for pseudohomophone transposed-letter pairs (kaniso-CASINO vs. kaviro-CASINO). Results showed a transposed-letter priming effect for the correctly spelled pairs, but not for the pseudohomophone pairs. This is consistent with the view that letter position coding is (primarily) orthographic in nature.

  7. Data Compression of Fingerprint Minutiae

    OpenAIRE

    VISHAL SHRIVASTAVA; SUMIT SHARMA

    2012-01-01

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric ch...

  8. Enhancing of chemical compound and drug name recognition using representative tag scheme and fine-grained tokenization.

    Science.gov (United States)

    Dai, Hong-Jie; Lai, Po-Ting; Chang, Yung-Chun; Tsai, Richard Tzong-Han

    2015-01-01

    The functions of chemical compounds and drugs that affect biological processes and their particular effect on the onset and treatment of diseases have attracted increasing interest with the advancement of research in the life sciences. To extract knowledge from the extensive literatures on such compounds and drugs, the organizers of BioCreative IV administered the CHEMical Compound and Drug Named Entity Recognition (CHEMDNER) task to establish a standard dataset for evaluating state-of-the-art chemical entity recognition methods. This study introduces the approach of our CHEMDNER system. Instead of emphasizing the development of novel feature sets for machine learning, this study investigates the effect of various tag schemes on the recognition of the names of chemicals and drugs by using conditional random fields. Experiments were conducted using combinations of different tokenization strategies and tag schemes to investigate the effects of tag set selection and tokenization method on the CHEMDNER task. This study presents the performance of CHEMDNER of three more representative tag schemes-IOBE, IOBES, and IOB12E-when applied to a widely utilized IOB tag set and combined with the coarse-/fine-grained tokenization methods. The experimental results thus reveal that the fine-grained tokenization strategy performance best in terms of precision, recall and F-scores when the IOBES tag set was utilized. The IOBES model with fine-grained tokenization yielded the best-F-scores in the six chemical entity categories other than the "Multiple" entity category. Nonetheless, no significant improvement was observed when a more representative tag schemes was used with the coarse or fine-grained tokenization rules. The best F-scores that were achieved using the developed system on the test dataset of the CHEMDNER task were 0.833 and 0.815 for the chemical documents indexing and the chemical entity mention recognition tasks, respectively. The results herein highlight the importance

  9. CNNs flag recognition preprocessing scheme based on gray scale stretching and local binary pattern

    Science.gov (United States)

    Gong, Qian; Qu, Zhiyi; Hao, Kun

    2017-07-01

    Flag is a rather special recognition target in image recognition because of its non-rigid features with the location, scale and rotation characteristics. The location change can be handled well by the depth learning algorithm Convolutional Neural Networks (CNNs), but the scale and rotation changes are quite a challenge for CNNs. Since it has good rotation and gray scale invariance, the local binary pattern (LBP) is combined with grayscale stretching and CNNs to make LBP and grayscale stretching as CNNs pretreatment, which can not only significantly improve the efficiency of flag recognition, but can also evaluate the recognition effect through ROC, accuracy, MSE and quality factor.

  10. An HMM-Like Dynamic Time Warping Scheme for Automatic Speech Recognition

    Directory of Open Access Journals (Sweden)

    Ing-Jr Ding

    2014-01-01

    Full Text Available In the past, the kernel of automatic speech recognition (ASR is dynamic time warping (DTW, which is feature-based template matching and belongs to the category technique of dynamic programming (DP. Although DTW is an early developed ASR technique, DTW has been popular in lots of applications. DTW is playing an important role for the known Kinect-based gesture recognition application now. This paper proposed an intelligent speech recognition system using an improved DTW approach for multimedia and home automation services. The improved DTW presented in this work, called HMM-like DTW, is essentially a hidden Markov model- (HMM- like method where the concept of the typical HMM statistical model is brought into the design of DTW. The developed HMM-like DTW method, transforming feature-based DTW recognition into model-based DTW recognition, will be able to behave as the HMM recognition technique and therefore proposed HMM-like DTW with the HMM-like recognition model will have the capability to further perform model adaptation (also known as speaker adaptation. A series of experimental results in home automation-based multimedia access service environments demonstrated the superiority and effectiveness of the developed smart speech recognition system by HMM-like DTW.

  11. An investigation of fake fingerprint detection approaches

    Science.gov (United States)

    Ahmad, Asraful Syifaa'; Hassan, Rohayanti; Othman, Razib M.

    2017-10-01

    The most reliable biometrics technology, fingerprint recognition is widely used in terms of security due to its permanence and uniqueness. However, it is also vulnerable to the certain type of attacks including presenting fake fingerprints to the sensor which requires the development of new and efficient protection measures. Particularly, the aim is to identify the most recent literature related to the fake fingerprint recognition and only focus on software-based approaches. A systematic review is performed by analyzing 146 primary studies from the gross collection of 34 research papers to determine the taxonomy, approaches, online public databases, and limitations of the fake fingerprint. Fourteen software-based approaches have been briefly described, four limitations of fake fingerprint image were revealed and two known fake fingerprint databases were addressed briefly in this review. Therefore this work provides an overview of an insight into the current understanding of fake fingerprint recognition besides identifying future research possibilities.

  12. Information Theoretical Analysis of Identification based on Active Content Fingerprinting

    OpenAIRE

    Farhadzadeh, Farzad; Willems, Frans M. J.; Voloshinovskiy, Sviatoslav

    2014-01-01

    Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called {\\em active content fingerprinting} was introduced to overcome these shortcomings. Active content fingerprinting aims to modify a content to extract robuster fingerprints than the conventional content fingerprinting....

  13. Fingerprint Change: Not Visible, But Tangible.

    Science.gov (United States)

    Negri, Francesca V; De Giorgi, Annamaria; Bozzetti, Cecilia; Squadrilli, Anna; Petronini, Pier Giorgio; Leonardi, Francesco; Bisogno, Luigi; Garofano, Luciano

    2017-09-01

    Hand-foot syndrome, a chemotherapy-induced cutaneous toxicity, can cause an alteration in fingerprints causing a setback for cancer patients due to the occurrence of false rejections. A colon cancer patient was fingerprinted after not having been able to use fingerprint recognition devices after 6 months of adjuvant chemotherapy. The fingerprint images were digitally processed to improve fingerprint definition without altering the papillary design. No evidence of skin toxicity was present. Two months later, the situation returned to normal. The fingerprint evaluation conducted on 15 identification points highlighted the quantitative and qualitative fingerprint alteration details detected after the end of chemotherapy and 2 months later. Fingerprint alteration during chemotherapy has been reported, but to our knowledge, this particular case is the first ever reported without evident clinical signs. Alternative fingerprint identification methods as well as improved biometric identification systems are needed in case of unexpected situations. © 2017 American Academy of Forensic Sciences.

  14. Defect Localization Capabilities of a Global Detection Scheme: Spatial Pattern Recognition Using Full-field Vibration Test Data in Plates

    Science.gov (United States)

    Saleeb, A. F.; Prabhu, M.; Arnold, S. M. (Technical Monitor)

    2002-01-01

    Recently, a conceptually simple approach, based on the notion of defect energy in material space has been developed and extensively studied (from the theoretical and computational standpoints). The present study focuses on its evaluation from the viewpoint of damage localization capabilities in case of two-dimensional plates; i.e., spatial pattern recognition on surfaces. To this end, two different experimental modal test results are utilized; i.e., (1) conventional modal testing using (white noise) excitation and accelerometer-type sensors and (2) pattern recognition using Electronic speckle pattern interferometry (ESPI), a full field method capable of analyzing the mechanical vibration of complex structures. Unlike the conventional modal testing technique (using contacting accelerometers), these emerging ESPI technologies operate in a non-contacting mode, can be used even under hazardous conditions with minimal or no presence of noise and can simultaneously provide measurements for both translations and rotations. Results obtained have clearly demonstrated the robustness and versatility of the global NDE scheme developed. The vectorial character of the indices used, which enabled the extraction of distinct patterns for localizing damages proved very useful. In the context of the targeted pattern recognition paradigm, two algorithms were developed for the interrogation of test measurements; i.e., intensity contour maps for the damaged index, and the associated defect energy vector field plots.

  15. Fingerprint start the next generation of payment method : Fingerprint payment: a new mode of mobile payment

    OpenAIRE

    Wu, Chong

    2016-01-01

    In the generation of mobile internet, fingerprint payment is one of the most popular topics at the moment. China has a big market and many users are using the mobile payment methods. There are a large number of mobile phones equipped with fingerprint recognition technology. As we know, fingerprint payment brings us more convenience and safety. We do not need to use many bankcards, and fingerprint also eliminates the users from the trouble of queuing to pay. However, users send traditional dig...

  16. Comparative Study on Feature Selection and Fusion Schemes for Emotion Recognition from Speech

    Directory of Open Access Journals (Sweden)

    Santiago Planet

    2012-09-01

    Full Text Available The automatic analysis of speech to detect affective states may improve the way users interact with electronic devices. However, the analysis only at the acoustic level could be not enough to determine the emotion of a user in a realistic scenario. In this paper we analyzed the spontaneous speech recordings of the FAU Aibo Corpus at the acoustic and linguistic levels to extract two sets of features. The acoustic set was reduced by a greedy procedure selecting the most relevant features to optimize the learning stage. We compared two versions of this greedy selection algorithm by performing the search of the relevant features forwards and backwards. We experimented with three classification approaches: Naïve-Bayes, a support vector machine and a logistic model tree, and two fusion schemes: decision-level fusion, merging the hard-decisions of the acoustic and linguistic classifiers by means of a decision tree; and feature-level fusion, concatenating both sets of features before the learning stage. Despite the low performance achieved by the linguistic data, a dramatic improvement was achieved after its combination with the acoustic information, improving the results achieved by this second modality on its own. The results achieved by the classifiers using the parameters merged at feature level outperformed the classification results of the decision-level fusion scheme, despite the simplicity of the scheme. Moreover, the extremely reduced set of acoustic features obtained by the greedy forward search selection algorithm improved the results provided by the full set.

  17. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  18. Rapid Discrimination for Traditional Complex Herbal Medicines from Different Parts, Collection Time, and Origins Using High-Performance Liquid Chromatography and Near-Infrared Spectral Fingerprints with Aid of Pattern Recognition Methods

    Directory of Open Access Journals (Sweden)

    Haiyan Fu

    2015-01-01

    Full Text Available As an effective method, the fingerprint technique, which emphasized the whole compositions of samples, has already been used in various fields, especially in identifying and assessing the quality of herbal medicines. High-performance liquid chromatography (HPLC and near-infrared (NIR, with their unique characteristics of reliability, versatility, precision, and simple measurement, played an important role among all the fingerprint techniques. In this paper, a supervised pattern recognition method based on PLSDA algorithm by HPLC and NIR has been established to identify the information of Hibiscus mutabilis L. and Berberidis radix, two common kinds of herbal medicines. By comparing component analysis (PCA, linear discriminant analysis (LDA, and particularly partial least squares discriminant analysis (PLSDA with different fingerprint preprocessing of NIR spectra variables, PLSDA model showed perfect functions on the analysis of samples as well as chromatograms. Most important, this pattern recognition method by HPLC and NIR can be used to identify different collection parts, collection time, and different origins or various species belonging to the same genera of herbal medicines which proved to be a promising approach for the identification of complex information of herbal medicines.

  19. SVD compression for magnetic resonance fingerprinting in the time domain.

    Science.gov (United States)

    McGivney, Debra F; Pierre, Eric; Ma, Dan; Jiang, Yun; Saybasili, Haris; Gulani, Vikas; Griswold, Mark A

    2014-12-01

    Magnetic resonance (MR) fingerprinting is a technique for acquiring and processing MR data that simultaneously provides quantitative maps of different tissue parameters through a pattern recognition algorithm. A predefined dictionary models the possible signal evolutions simulated using the Bloch equations with different combinations of various MR parameters and pattern recognition is completed by computing the inner product between the observed signal and each of the predicted signals within the dictionary. Though this matching algorithm has been shown to accurately predict the MR parameters of interest, one desires a more efficient method to obtain the quantitative images. We propose to compress the dictionary using the singular value decomposition, which will provide a low-rank approximation. By compressing the size of the dictionary in the time domain, we are able to speed up the pattern recognition algorithm, by a factor of between 3.4-4.8, without sacrificing the high signal-to-noise ratio of the original scheme presented previously.

  20. Recognition

    DEFF Research Database (Denmark)

    Gimmler, Antje

    2017-01-01

    In this article, I shall examine the cognitive, heuristic and theoretical functions of the concept of recognition. To evaluate both the explanatory power and the limitations of a sociological concept, the theory construction must be analysed and its actual productivity for sociological theory mus...

  1. A fingerprint classification algorithm based on combination of local and global information

    Science.gov (United States)

    Liu, Chongjin; Fu, Xiang; Bian, Junjie; Feng, Jufu

    2011-12-01

    Fingerprint recognition is one of the most important technologies in biometric identification and has been wildly applied in commercial and forensic areas. Fingerprint classification, as the fundamental procedure in fingerprint recognition, can sharply decrease the quantity for fingerprint matching and improve the efficiency of fingerprint recognition. Most fingerprint classification algorithms are based on the number and position of singular points. Because the singular points detecting method only considers the local information commonly, the classification algorithms are sensitive to noise. In this paper, we propose a novel fingerprint classification algorithm combining the local and global information of fingerprint. Firstly we use local information to detect singular points and measure their quality considering orientation structure and image texture in adjacent areas. Furthermore the global orientation model is adopted to measure the reliability of singular points group. Finally the local quality and global reliability is weighted to classify fingerprint. Experiments demonstrate the accuracy and effectivity of our algorithm especially for the poor quality fingerprint images.

  2. Case study of 3D fingerprints applications.

    Directory of Open Access Journals (Sweden)

    Feng Liu

    Full Text Available Human fingers are 3D objects. More information will be provided if three dimensional (3D fingerprints are available compared with two dimensional (2D fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. The applications of these features are finally discussed. A series of experiments are conducted to demonstrate the helpfulness of 3D information to fingerprint recognition. Results show that a quick alignment can be easily implemented under the guidance of 3D finger shape feature even though this feature does not work for fingerprint recognition directly. The newly defined distinctive 3D shape ridge feature can be used for personal authentication with Equal Error Rate (EER of ~8.3%. Also, it is helpful to remove false core point. Furthermore, a promising of EER ~1.3% is realized by combining this feature with 2D features for fingerprint recognition which indicates the prospect of 3D fingerprint recognition.

  3. Cognitive Fingerprints

    Science.gov (United States)

    2015-03-25

    is another cognitive fingerprint that has been used extensively for authorship . This work has been ex- tended to authentication by relating keyboard...this work is the inference of high-level features such as personality, gender , and dominant hand but those features have not been integrated to date

  4. A fingerprint key binding algorithm based on vector quantization and error correction

    Science.gov (United States)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  5. Towards secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available an accuracy figure of 76.8%. This small difference between the two figures is indicative of the validity of the proposed secondary classification module. Keywords?fingerprint core; fingerprint delta; primary classifi- cation; secondary classification I..., namely, the fingerprint core and the fingerprint delta. Forensically, a fingerprint core is defined as the innermost turning point where the fingerprint ridges form a loop, while the fingerprint delta is defined as the point where these ridges form a...

  6. Fissile fingerprints

    International Nuclear Information System (INIS)

    Edwards, R.

    1995-01-01

    This article looks at recent research which may allow police and customs officers to detect smuggled weapons-grade plutonium and uranium. Contrary to popular opinion, nuclear materials do not have a nuclear ''fingerprint'' but enough information can be gleaned from sources to confirm what has been learnt from other data. Indeed, two leading nuclear laboratories can look at the same analytical results and draw different conclusions. The case of a lead cylinder seized from a German garage is examined to illustrate the confusion. (UK)

  7. News Schemes for Activity Recognition Systems Using PCA-WSVM, ICA-WSVM, and LDA-WSVM

    Directory of Open Access Journals (Sweden)

    M’hamed Bilal Abidine

    2015-08-01

    Full Text Available Feature extraction and classification are two key steps for activity recognition in a smart home environment. In this work, we used three methods for feature extraction: Principal Component Analysis (PCA, Independent Component Analysis (ICA, and Linear Discriminant Analysis (LDA. The new features selected by each method are then used as the inputs for a Weighted Support Vector Machines (WSVM classifier. This classifier is used to handle the problem of imbalanced activity data from the sensor readings. The experiments were implemented on multiple real-world datasets with Conditional Random Fields (CRF, standard Support Vector Machines (SVM, Weighted SVM, and combined methods PCA+WSVM, ICA+WSVM, and LDA+WSVM showed that LDA+WSVM had a higher recognition rate than other methods for activity recognition.

  8. Three-dimensional imaging of artificial fingerprint by optical coherence tomography

    Science.gov (United States)

    Larin, Kirill V.; Cheng, Yezeng

    2008-03-01

    Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.

  9. An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique

    OpenAIRE

    Ramakrishnan, Josphineleela; Ramakrishnan, M.

    2012-01-01

    Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric syste...

  10. Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid

    Directory of Open Access Journals (Sweden)

    Yujia Jiang

    2018-01-01

    Full Text Available Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP in spatial pyramid is applied to recognize fingerprint liveness in this paper. Firstly, preprocessing operation for each fingerprint is necessary. Then, to solve image rotation and scale invariance, three-layer spatial pyramids of fingerprints are introduced in this paper. Next, texture information for three layers spatial pyramids is described by using uniform local binary pattern to extract features of given fingerprints. The accuracy of our proposed method has been compared with several state-of-the-art methods in fingerprint liveness detection. Experiments based on standard databases, taken from Liveness Detection Competition 2013 composed of four different fingerprint sensors, have been carried out. Finally, classifier model based on extracted features is trained using SVM classifier. Experimental results present that our proposed method can achieve high recognition accuracy compared with other methods.

  11. Advanced Fingerprint Analysis Project Fingerprint Constituents

    Energy Technology Data Exchange (ETDEWEB)

    GM Mong; CE Petersen; TRW Clauss

    1999-10-29

    The work described in this report was focused on generating fundamental data on fingerprint components which will be used to develop advanced forensic techniques to enhance fluorescent detection, and visualization of latent fingerprints. Chemical components of sweat gland secretions are well documented in the medical literature and many chemical techniques are available to develop latent prints, but there have been no systematic forensic studies of fingerprint sweat components or of the chemical and physical changes these substances undergo over time.

  12. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    Directory of Open Access Journals (Sweden)

    Atul S. CHAUDHARI

    2014-01-01

    Full Text Available Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris or behavioral (e.g., gait, signature characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometric characteristic as it is unique and persistence. Fingerprint is the pattern of ridges and valleys on the surface of fingertip. However, recognizing fingerprints in poor quality images is still a very complex job, so the fingerprint image must be preprocessed before matching. It is very difficult to extract fingerprint features directly from gray scale fingerprint image. In this paper we have proposed the system which uses minutiae based matching algorithm for fingerprint identification. There are three main phases in proposed algorithm. First phase enhance the input fingerprint image by preprocessing it. The enhanced fingerprint image is converted into thinned binary image and then minutiae are extracted by using Crossing Number Concept in second phase. Third stage compares input fingerprint image (after preprocessing and minutiae extraction with fingerprint images enrolled in database and makes decision whether the input fingerprint is matched with the fingerprint stored in database or not.

  13. Fingerprint Sensors: Liveness Detection Issue and Hardware based Solutions

    Directory of Open Access Journals (Sweden)

    Shahzad Memon

    2012-01-01

    Full Text Available Securing an automated and unsupervised fingerprint recognition system is one of the most critical and challenging tasks in government and commercial applications. In these systems, the detection of liveness of a finger placed on a fingerprint sensor is a major issue that needs to be addressed in order to ensure the credibility of the system. The main focus of this paper is to review the existing fingerprint sensing technologies in terms of liveness detection and discusses hardware based ‘liveness detection’ techniques reported in the literature for automatic fingerprint biometrics.

  14. Pseudo Identities Based on Fingerprint Characteristics

    NARCIS (Netherlands)

    Delvaux, Nicolas; Chabanne, Herve; Bringer, Julien; Kindarji, Bruno; Lindeberg, Patrik; Midgren, Johannes; Breebaart, Jeroen; Akkermans, Ton; van der Veen, M.; Veldhuis, Raymond N.J.; Kindt, Els; Simoens, Koen; Busch, Christoph; Bours, Patrick; Gafurov, Davrondzhon; Yang, Bian; Stern, Julien; Rust, Carsten; Cucinelli, Bruno; Skepastianos, Dimitrios

    2008-01-01

    This paper presents the integrated project TURBINE which is funded under the EU 7th research framework programme. This research is a multi-disciplinary effort on privacy enhancing technology, combining innovative developments in cryptography and fingerprint recognition. The objective of this project

  15. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  16. Fingerprint pores extractor

    CSIR Research Space (South Africa)

    Mngenge, NA

    2012-11-01

    Full Text Available , this is not always the case because of diseases and hash working conditions that affect fingerprints. In order to maintain high level of security independent of varying fingerprint image quality research suggests the use of other fingerprint features to compliment...

  17. Fingerprints in cancer cells

    International Nuclear Information System (INIS)

    Servomaa, K.

    1994-01-01

    Gene research has shown that factors causing cancer, or carcinogens, may leave marks typical of each particular carcinogen (fingerprints) in the genotype of the cell. Radiation, for instance, may leave such fingerprints in a cancer cell. In particular, the discovery of a gene called p53 has yielded much new information on fingerprints. It has been discovered, for example, that toxic fungus and UV-radiation each leave fingerprints in the p53 gene. Based on the detection of fingerprints, it may be possible in the future to tell a cancer patient what factor had trigged the maglinancy

  18. Impact of Finger Type in Fingerprint Authentication

    Science.gov (United States)

    Gafurov, Davrondzhon; Bours, Patrick; Yang, Bian; Busch, Christoph

    Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.

  19. Magnetic resonance fingerprinting.

    Science.gov (United States)

    Ma, Dan; Gulani, Vikas; Seiberlich, Nicole; Liu, Kecheng; Sunshine, Jeffrey L; Duerk, Jeffrey L; Griswold, Mark A

    2013-03-14

    Magnetic resonance is an exceptionally powerful and versatile measurement technique. The basic structure of a magnetic resonance experiment has remained largely unchanged for almost 50 years, being mainly restricted to the qualitative probing of only a limited set of the properties that can in principle be accessed by this technique. Here we introduce an approach to data acquisition, post-processing and visualization--which we term 'magnetic resonance fingerprinting' (MRF)--that permits the simultaneous non-invasive quantification of multiple important properties of a material or tissue. MRF thus provides an alternative way to quantitatively detect and analyse complex changes that can represent physical alterations of a substance or early indicators of disease. MRF can also be used to identify the presence of a specific target material or tissue, which will increase the sensitivity, specificity and speed of a magnetic resonance study, and potentially lead to new diagnostic testing methodologies. When paired with an appropriate pattern-recognition algorithm, MRF inherently suppresses measurement errors and can thus improve measurement accuracy.

  20. Self-Organizing Maps for Fingerprint Image Quality Assessment

    DEFF Research Database (Denmark)

    Olsen, Martin Aastrup; Tabassi, Elham; Makarov, Anton

    2013-01-01

    Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification and iden......Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification...... machine learning techniques. We train a self-organizing map (SOM) to cluster blocks of fingerprint images based on their spatial information content. The output of the SOM is a high-level representation of the finger image, which forms the input to a Random Forest trained to learn the relationship between...

  1. Generating cancelable fingerprint templates.

    Science.gov (United States)

    Ratha, Nalini K; Chikkerur, Sharat; Connell, Jonathan H; Bolle, Ruud M

    2007-04-01

    Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key." The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.

  2. Dna fingerprinting - review paper

    OpenAIRE

    Blundell, Renald

    2006-01-01

    Before the Polymerase Chain Reaction (PCR) was established, DNA fingerprinting technology has relied for years on Restriction Fragment Length Polymorphism (RFLP) and Variable Number of Tandom Repeats (VNTR) analysis, a very efficient technique but quite laborious and not suitable for high throughput mapping. Since its, development, PCR has provided a new and powerful tool for DNA fingerprinting.

  3. Photogrammetric fingerprint unwrapping

    Science.gov (United States)

    Paar, Gerhard; del Pilar Caballo Perucha, Maria; Bauer, Arnold; Nauschnegg, Bernhard

    2008-04-01

    Fingerprints are important biometric cues. Compared to conventional fingerprint sensors the use of contact-free stereoscopic image acquisition of the front-most finger segment has a set of advantages: Finger deformation is avoided, the entire relevant area for biometric use is covered, some technical aspects like sensor maintenance and cleaning are facilitated, and access to a three-dimensional reconstruction of the covered area is possible. We describe a photogrammetric workflow for nail-to-nail fingerprint reconstruction: A calibrated sensor setup with typically 5 cameras and dedicated illumination acquires adjacent stereo pairs. Using the silhouettes of the segmented finger a raw cylindrical model is generated. After preprocessing (shading correction, dust removal, lens distortion correction), each individual camera texture is projected onto the model. Image-to-image matching on these pseudo ortho images and dense 3D reconstruction obtains a textured cylindrical digital surface model with radial distances around the major axis and a grid size in the range of 25-50 µm. The model allows for objective fingerprint unwrapping and novel fingerprint matching algorithms since 3D relations between fingerprint features are available as additional cues. Moreover, covering the entire region with relevant fingerprint texture is particularly important for establishing a comprehensive forensic database. The workflow has been implemented in portable C and is ready for industrial exploitation. Further improvement issues are code optimization, unwrapping method, illumination strategy to avoid highlights and to improve the initial segmentation, and the comparison of the unwrapping result to conventional fingerprint acquisition technology.

  4. Spectral Minutiae Representations for Fingerprint Recognition

    OpenAIRE

    Xu, H.

    2010-01-01

    Nowadays, biometric technology is increasingly deployed in civil and commercial applications. The growing use of biometrics is raising security and privacy concerns about the biometric technology. Storing biometric data, known as biometric templates, in a database leads to several privacy risks such as identity fraud and cross matching. A solution is to apply biometric template protection techniques, which aim to make it impossible to recover the biometric data from the templates. The researc...

  5. Spectral Minutiae Representations for Fingerprint Recognition

    NARCIS (Netherlands)

    Xu, H.

    2010-01-01

    Nowadays, biometric technology is increasingly deployed in civil and commercial applications. The growing use of biometrics is raising security and privacy concerns about the biometric technology. Storing biometric data, known as biometric templates, in a database leads to several privacy risks such

  6. Physics and fingerprints

    Science.gov (United States)

    Voss-de Haan, Patrick

    2006-08-01

    This article discusses a variety of aspects in the detection and development of fingerprints and the physics involved in it. It gives an introduction to some basic issues like composition and properties of fingerprint deposits and a rudimentary framework of dactyloscopy; it covers various techniques for the visualization of latent fingerprints; and it concludes with a view of current research topics. The techniques range from very common procedures, such as powdering and cyanoacrylate fuming, to more demanding methods, for example luminescence and vacuum metal deposition, to fairly unusual approaches like autoradiography. The emphasis is placed on the physical rather than the forensic aspects of these topics while trying to give the physicist—who is not dealing with fingerprinting and forensic science on a daily basis—a feeling for the problems and solutions in the visualization of latent fingerprints.

  7. 3D fingerprint imaging system based on full-field fringe projection profilometry

    Science.gov (United States)

    Huang, Shujun; Zhang, Zonghua; Zhao, Yan; Dai, Jie; Chen, Chao; Xu, Yongjia; Zhang, E.; Xie, Lili

    2014-01-01

    As an unique, unchangeable and easily acquired biometrics, fingerprint has been widely studied in academics and applied in many fields over the years. The traditional fingerprint recognition methods are based on the obtained 2D feature of fingerprint. However, fingerprint is a 3D biological characteristic. The mapping from 3D to 2D loses 1D information and causes nonlinear distortion of the captured fingerprint. Therefore, it is becoming more and more important to obtain 3D fingerprint information for recognition. In this paper, a novel 3D fingerprint imaging system is presented based on fringe projection technique to obtain 3D features and the corresponding color texture information. A series of color sinusoidal fringe patterns with optimum three-fringe numbers are projected onto a finger surface. From another viewpoint, the fringe patterns are deformed by the finger surface and captured by a CCD camera. 3D shape data of the finger can be obtained from the captured fringe pattern images. This paper studies the prototype of the 3D fingerprint imaging system, including principle of 3D fingerprint acquisition, hardware design of the 3D imaging system, 3D calibration of the system, and software development. Some experiments are carried out by acquiring several 3D fingerprint data. The experimental results demonstrate the feasibility of the proposed 3D fingerprint imaging system.

  8. Advances in fingerprint analysis.

    Science.gov (United States)

    Hazarika, Pompi; Russell, David A

    2012-04-10

    Fingerprints have been used in forensic investigations for the identification of individuals since the late 19th century. However, it is now clear that fingerprints can provide significantly more information about an individual. Here, we highlight the considerable advances in fingerprinting technology that can simultaneously provide chemical information regarding the drugs ingested and the explosives and drugs handled by a person as well as the identity of that individual. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  9. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  10. Making DNA Fingerprints.

    Science.gov (United States)

    Nunley, Kathie F.

    1996-01-01

    Presents an activity to simulate electrophoresis using everyday items. Uses adding machine paper to construct a set of DNA fingerprints that can be used to solve crime cases designed by students in any biology class. (JRH)

  11. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  12. Fingerprints in Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Cording, Patrick Hagge; Gørtz, Inge Li

    2013-01-01

    The Karp-Rabin fingerprint of a string is a type of hash value that due to its strong properties has been used in many string algorithms. In this paper we show how to construct a data structure for a string S of size N compressed by a context-free grammar of size n that answers fingerprint queries...... derivative that captures LZ78 compression and its variations) we get O(loglogN) query time. Hence, our data structures has the same time and space complexity as for random access in SLPs. We utilize the fingerprint data structures to solve the longest common extension problem in query time O(logNlogℓ) and O....... That is, given indices i and j, the answer to a query is the fingerprint of the substring S[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(logN) query time, and for Linear SLPs (an SLP...

  13. Human ear recognition by computer

    CERN Document Server

    Bhanu, Bir; Chen, Hui

    2010-01-01

    Biometrics deals with recognition of individuals based on their physiological or behavioral characteristics. The human ear is a new feature in biometrics that has several merits over the more common face, fingerprint and iris biometrics. Unlike the fingerprint and iris, it can be easily captured from a distance without a fully cooperative subject, although sometimes it may be hidden with hair, scarf and jewellery. Also, unlike a face, the ear is a relatively stable structure that does not change much with the age and facial expressions. ""Human Ear Recognition by Computer"" is the first book o

  14. Evaluating the change in fingerprint directional patterns under variation of rotation and number of regions

    CSIR Research Space (South Africa)

    Dorasamy, K

    2015-09-01

    Full Text Available Directional Patterns, which are formed by grouping regions of orientation fields falling within a specific range, vary under rotation and the number of regions. For fingerprint classification schemes, this can result in missclassification due...

  15. An Introduction to DNA Fingerprinting.

    Science.gov (United States)

    Hepfer, Carol Ely; And Others

    1993-01-01

    Provides background information on DNA fingerprinting, and describes exercises for introducing general biology students at the high school or college level to the methodology and applications of DNA fingerprinting. (PR)

  16. Fingerprinting with Wow

    Science.gov (United States)

    Yu, Eugene; Craver, Scott

    2006-02-01

    Wow, or time warping caused by speed fluctuations in analog audio equipment, provides a wealth of applications in watermarking. Very subtle temporal distortion has been used to defeat watermarks, and as components in watermarking systems. In the image domain, the analogous warping of an image's canvas has been used both to defeat watermarks and also proposed to prevent collusion attacks on fingerprinting systems. In this paper, we explore how subliminal levels of wow can be used for steganography and fingerprinting. We present both a low-bitrate robust solution and a higher-bitrate solution intended for steganographic communication. As already observed, such a fingerprinting algorithm naturally discourages collusion by averaging, owing to flanging effects when misaligned audio is averaged. Another advantage of warping is that even when imperceptible, it can be beyond the reach of compression algorithms. We use this opportunity to debunk the common misconception that steganography is impossible under "perfect compression."

  17. Fingerprints in compressed strings

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li; Cording, Patrick Hagge

    2017-01-01

    In this paper we show how to construct a data structure for a string S of size N compressed into a context-free grammar of size n that supports efficient Karp–Rabin fingerprint queries to any substring of S. That is, given indices i and j, the answer to a query is the fingerprint of the substring S......[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(log⁡N) query time, and for Linear SLPs (an SLP derivative that captures LZ78 compression and its variations) we get O(log⁡log⁡N) query time...

  18. Partial Device Fingerprints

    NARCIS (Netherlands)

    Ciere, M.; Hernandez Ganan, C.; van Eeten, M.J.G.

    2017-01-01

    In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of clientside attributes such as the device’s browser and operating system version, installed plugins, screen resolution, hardware artifacts, Wi-Fi settings, and anything else

  19. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  20. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.; Schönlieb, C.-B.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  1. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors\\' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors\\' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  2. Families of quantum fingerprinting protocols

    Science.gov (United States)

    Lovitz, Benjamin; Lütkenhaus, Norbert

    2018-03-01

    We introduce several families of quantum fingerprinting protocols to evaluate the equality function on two n -bit strings in the simultaneous message passing model. The original quantum fingerprinting protocol uses a tensor product of a small number of O (logn ) -qubit high-dimensional signals [H. Buhrman et al., Phys. Rev. Lett. 87, 167902 (2001), 10.1103/PhysRevLett.87.167902], whereas a recently proposed optical protocol uses a tensor product of O (n ) single-qubit signals, while maintaining the O (logn ) information leakage of the original protocol [J. M. Arazola and N. Lütkenhaus, Phys. Rev. A 89, 062305 (2014), 10.1103/PhysRevA.89.062305]. We find a family of protocols which interpolate between the original and optical protocols while maintaining the O (logn ) information leakage, thus demonstrating a tradeoff between the number of signals sent and the dimension of each signal. There has been interest in experimental realization of the recently proposed optical protocol using coherent states [F. Xu et al., Nat. Commun. 6, 8735 (2015), 10.1038/ncomms9735; J.-Y. Guan et al., Phys. Rev. Lett. 116, 240502 (2016), 10.1103/PhysRevLett.116.240502], but as the required number of laser pulses grows linearly with the input size n , eventual challenges for the long-time stability of experimental setups arise. We find a coherent state protocol which reduces the number of signals by a factor 1/2 while also reducing the information leakage. Our reduction makes use of a simple modulation scheme in optical phase space, and we find that more complex modulation schemes are not advantageous. Using a similar technique, we improve a recently proposed coherent state protocol for evaluating the Euclidean distance between two real unit vectors [N. Kumar et al., Phys. Rev. A 95, 032337 (2017), 10.1103/PhysRevA.95.032337] by reducing the number of signals by a factor 1/2 and also reducing the information leakage.

  3. Laser speckle decorrelation for fingerprint acquisition

    International Nuclear Information System (INIS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-01-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases. (paper)

  4. Holistic processing of fingerprints by expert forensic examiners.

    Science.gov (United States)

    Vogelsang, Macgregor D; Palmeri, Thomas J; Busey, Thomas A

    2017-01-01

    Holistic processing is often characterized as a process by which objects are perceived as a whole rather than a compilation of individual features. This mechanism may play an important role in the development of perceptual expertise because it allows for rapid integration across image regions. The present work explores whether holistic processing is present in latent fingerprint examiners, who compare fingerprints collected from crime scenes against a set of standards taken from a suspect. We adapted a composite task widely used in the face recognition and perceptual expertise literatures, in which participants were asked to match only a particular half of a fingerprint with a previous image while ignoring the other half. We tested both experts and novices, using both upright and inverted fingerprints. For upright fingerprints, we found weak evidence for holistic processing, but with no differences between experts and novices with respect to holistic processing. For inverted fingerprints, we found stronger evidence of holistic processing, with weak evidence for differences between experts and novices. These relatively weak holistic processing effects contrast with robust evidence for holistic processing with faces and with objects in other domains of perceptual expertise. The data constrain models of holistic processing by demonstrating that latent fingerprint experts and novices may not substantively differ in terms of the amount of holistic processing and that inverted stimuli actually produced more evidence for holistic processing than upright stimuli. Important differences between the present fingerprint stimuli and those in the literature include the lack of verbal labels for experts and the absence of strong vertical asymmetries, both of which might contribute to stronger holistic processing signatures in other stimulus domains.

  5. A novel interaction fingerprint derived from per atom score contributions: exhaustive evaluation of interaction fingerprint performance in docking based virtual screening.

    Science.gov (United States)

    Jasper, Julia B; Humbeck, Lina; Brinkjost, Tobias; Koch, Oliver

    2018-03-16

    Protein ligand interaction fingerprints are a powerful approach for the analysis and assessment of docking poses to improve docking performance in virtual screening. In this study, a novel interaction fingerprint approach (PADIF, protein per atom score contributions derived interaction fingerprint) is presented which was specifically designed for utilising the GOLD scoring functions' atom contributions together with a specific scoring scheme. This allows the incorporation of known protein-ligand complex structures for a target-specific scoring. Unlike many other methods, this approach uses weighting factors reflecting the relative frequency of a specific interaction in the references and penalizes destabilizing interactions. In addition, and for the first time, an exhaustive validation study was performed that assesses the performance of PADIF and two other interaction fingerprints in virtual screening. Here, PADIF shows superior results, and some rules of thumb for a successful use of interaction fingerprints could be identified.

  6. Sensor Interoperability and Fusion in Fingerprint Verification: A Case Study using Minutiae-and Ridge-Based Matchers

    NARCIS (Netherlands)

    Alonso-Fernandez, F.; Veldhuis, Raymond N.J.; Bazen, A.M.; Fierrez-Aguilar, J.; Ortega-Garcia, J.

    2006-01-01

    Information fusion in fingerprint recognition has been studied in several papers. However, only a few papers have been focused on sensor interoperability and sensor fusion. In this paper, these two topics are studied using a multisensor database acquired with three different fingerprint sensors.

  7. Low rank magnetic resonance fingerprinting.

    Science.gov (United States)

    Mazor, Gal; Weizman, Lior; Tal, Assaf; Eldar, Yonina C

    2016-08-01

    Magnetic Resonance Fingerprinting (MRF) is a relatively new approach that provides quantitative MRI using randomized acquisition. Extraction of physical quantitative tissue values is preformed off-line, based on acquisition with varying parameters and a dictionary generated according to the Bloch equations. MRF uses hundreds of radio frequency (RF) excitation pulses for acquisition, and therefore high under-sampling ratio in the sampling domain (k-space) is required. This under-sampling causes spatial artifacts that hamper the ability to accurately estimate the quantitative tissue values. In this work, we introduce a new approach for quantitative MRI using MRF, called Low Rank MRF. We exploit the low rank property of the temporal domain, on top of the well-known sparsity of the MRF signal in the generated dictionary domain. We present an iterative scheme that consists of a gradient step followed by a low rank projection using the singular value decomposition. Experiments on real MRI data demonstrate superior results compared to conventional implementation of compressed sensing for MRF at 15% sampling ratio.

  8. A New Approach for Fingerprint Image Compression

    Energy Technology Data Exchange (ETDEWEB)

    Mazieres, Bertrand

    1997-12-01

    The FBI has been collecting fingerprint cards since 1924 and now has over 200 million of them. Digitized with 8 bits of grayscale resolution at 500 dots per inch, it means 2000 terabytes of information. Also, without any compression, transmitting a 10 Mb card over a 9600 baud connection will need 3 hours. Hence we need a compression and a compression as close to lossless as possible: all fingerprint details must be kept. A lossless compression usually do not give a better compression ratio than 2:1, which is not sufficient. Compressing these images with the JPEG standard leads to artefacts which appear even at low compression rates. Therefore the FBI has chosen in 1993 a scheme of compression based on a wavelet transform, followed by a scalar quantization and an entropy coding : the so-called WSQ. This scheme allows to achieve compression ratios of 20:1 without any perceptible loss of quality. The publication of the FBI specifies a decoder, which means that many parameters can be changed in the encoding process: the type of analysis/reconstruction filters, the way the bit allocation is made, the number of Huffman tables used for the entropy coding. The first encoder used 9/7 filters for the wavelet transform and did the bit allocation using a high-rate bit assumption. Since the transform is made into 64 subbands, quite a lot of bands receive only a few bits even at an archival quality compression rate of 0.75 bit/pixel. Thus, after a brief overview of the standard, we will discuss a new approach for the bit-allocation that seems to make more sense where theory is concerned. Then we will talk about some implementation aspects, particularly for the new entropy coder and the features that allow other applications than fingerprint image compression. Finally, we will compare the performances of the new encoder to those of the first encoder.

  9. Magnetic Resonance Fingerprinting with short relaxation intervals.

    Science.gov (United States)

    Amthor, Thomas; Doneva, Mariya; Koken, Peter; Sommer, Karsten; Meineke, Jakob; Börnert, Peter

    2017-09-01

    The aim of this study was to investigate a technique for improving the performance of Magnetic Resonance Fingerprinting (MRF) in repetitive sampling schemes, in particular for 3D MRF acquisition, by shortening relaxation intervals between MRF pulse train repetitions. A calculation method for MRF dictionaries adapted to short relaxation intervals and non-relaxed initial spin states is presented, based on the concept of stationary fingerprints. The method is applicable to many different k-space sampling schemes in 2D and 3D. For accuracy analysis, T 1 and T 2 values of a phantom are determined by single-slice Cartesian MRF for different relaxation intervals and are compared with quantitative reference measurements. The relevance of slice profile effects is also investigated in this case. To further illustrate the capabilities of the method, an application to in-vivo spiral 3D MRF measurements is demonstrated. The proposed computation method enables accurate parameter estimation even for the shortest relaxation intervals, as investigated for different sampling patterns in 2D and 3D. In 2D Cartesian measurements, we achieved a scan acceleration of more than a factor of two, while maintaining acceptable accuracy: The largest T 1 values of a sample set deviated from their reference values by 0.3% (longest relaxation interval) and 2.4% (shortest relaxation interval). The largest T 2 values showed systematic deviations of up to 10% for all relaxation intervals, which is discussed. The influence of slice profile effects for multislice acquisition is shown to become increasingly relevant for short relaxation intervals. In 3D spiral measurements, a scan time reduction of 36% was achieved, maintaining the quality of in-vivo T1 and T2 maps. Reducing the relaxation interval between MRF sequence repetitions using stationary fingerprint dictionaries is a feasible method to improve the scan efficiency of MRF sequences. The method enables fast implementations of 3D spatially

  10. SURVEY OF BIOMETRIC SYSTEMS USING IRIS RECOGNITION

    OpenAIRE

    S.PON SANGEETHA; DR.M.KARNAN

    2014-01-01

    The security plays an important role in any type of organization in today’s life. Iris recognition is one of the leading automatic biometric systems in the area of security which is used to identify the individual person. Biometric systems include fingerprints, facial features, voice recognition, hand geometry, handwriting, the eye retina and the most secured one presented in this paper, the iris recognition. Biometric systems has become very famous in security systems because it is not possi...

  11. Automatic Picking of Foraminifera: Design of the Foraminifera Image Recognition and Sorting Tool (FIRST) Prototype and Results of the Image Classification Scheme

    Science.gov (United States)

    de Garidel-Thoron, T.; Marchant, R.; Soto, E.; Gally, Y.; Beaufort, L.; Bolton, C. T.; Bouslama, M.; Licari, L.; Mazur, J. C.; Brutti, J. M.; Norsa, F.

    2017-12-01

    Foraminifera tests are the main proxy carriers for paleoceanographic reconstructions. Both geochemical and taxonomical studies require large numbers of tests to achieve statistical relevance. To date, the extraction of foraminifera from the sediment coarse fraction is still done by hand and thus time-consuming. Moreover, the recognition of morphotypes, ecologically relevant, requires some taxonomical skills not easily taught. The automatic recognition and extraction of foraminifera would largely help paleoceanographers to overcome these issues. Recent advances in automatic image classification using machine learning opens the way to automatic extraction of foraminifera. Here we detail progress on the design of an automatic picking machine as part of the FIRST project. The machine handles 30 pre-sieved samples (100-1000µm), separating them into individual particles (including foraminifera) and imaging each in pseudo-3D. The particles are classified and specimens of interest are sorted either for Individual Foraminifera Analyses (44 per slide) and/or for classical multiple analyses (8 morphological classes per slide, up to 1000 individuals per hole). The classification is based on machine learning using Convolutional Neural Networks (CNNs), similar to the approach used in the coccolithophorid imaging system SYRACO. To prove its feasibility, we built two training image datasets of modern planktonic foraminifera containing approximately 2000 and 5000 images each, corresponding to 15 & 25 morphological classes. Using a CNN with a residual topology (ResNet) we achieve over 95% correct classification for each dataset. We tested the network on 160,000 images from 45 depths of a sediment core from the Pacific ocean, for which we have human counts. The current algorithm is able to reproduce the downcore variability in both Globigerinoides ruber and the fragmentation index (r2 = 0.58 and 0.88 respectively). The FIRST prototype yields some promising results for high

  12. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  13. Classical and quantum fingerprinting strategies

    International Nuclear Information System (INIS)

    Scott, A.; Walgate, J.; Sanders, B.

    2005-01-01

    Full text: Fingerprinting enables two parties to infer whether the messages they hold are the same or different when the cost of communication is high: each message is associated with a smaller fingerprint and comparisons between messages are made in terms of their fingerprints alone. When the two parties are forbidden access to a public coin, it is known that fingerprints composed of quantum information can be made exponentially smaller than those composed of classical information. We present specific constructions of classical fingerprinting strategies through the use of constant-weight codes and provide bounds on the worst-case error probability with the help of extremal set theory. These classical strategies are easily outperformed by quantum strategies constructed from line packings and equiangular tight frames. (author)

  14. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    Science.gov (United States)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  15. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem

    Directory of Open Access Journals (Sweden)

    Helala AlShehri

    2018-03-01

    Full Text Available The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  16. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem.

    Science.gov (United States)

    AlShehri, Helala; Hussain, Muhammad; AboAlSamh, Hatim; AlZuair, Mansour

    2018-03-28

    The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass) that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  17. High Resolution Ultrasonic Method for 3D Fingerprint Representation in Biometrics

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Y.; Maeva, E. Y.; Severin, F. M.

    Biometrics is an important field which studies different possible ways of personal identification. Among a number of existing biometric techniques fingerprint recognition stands alone - because very large database of fingerprints has already been acquired. Also, fingerprints are an important evidence that can be collected at a crime scene. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. Ultrasonic method of fingerprint imaging was originally introduced over a decade as the mapping of the reflection coefficient at the interface between the finger and a covering plate and has shown very good reliability and free from imperfections of previous two methods. This work introduces a newer development of the ultrasonic fingerprint imaging, focusing on the imaging of the internal structures of fingerprints (including sweat pores) with raw acoustic resolution of about 500 dpi (0.05 mm) using a scanning acoustic microscope to obtain images and acoustic data in the form of 3D data array. C-scans from different depths inside the fingerprint area of fingers of several volunteers were obtained and showed good contrast of ridges-and-valleys patterns and practically exact correspondence to the standard ink-and-paper prints of the same areas. Important feature reveled on the acoustic images was the clear appearance of the sweat pores, which could provide additional means of identification.

  18. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    Science.gov (United States)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  19. Modeling Audio Fingerprints : Structure, Distortion, Capacity

    NARCIS (Netherlands)

    Doets, P.J.O.

    2010-01-01

    An audio fingerprint is a compact low-level representation of a multimedia signal. An audio fingerprint can be used to identify audio files or fragments in a reliable way. The use of audio fingerprints for identification consists of two phases. In the enrollment phase known content is fingerprinted,

  20. Fingerprints of dynamical instabilities

    International Nuclear Information System (INIS)

    Chomaz, Ph.; Colonna, M.; Guarnera, A.

    1993-01-01

    It is explained why any reduced descriptions, such as mean field approximation, are stochastic in nature. It is shown that the introduction of this stochastic dynamics leads to a predictive theory in a statistical sens whatever the individual trajectories are characterized by the occurrence of bifurcations, instabilities or phase transitions. Concerning nuclear matter, the spinodal instability is discussed. In such a critical situation, the possibility to replace the stochastic part of the collision integral in the Boltzmann-Langevin model by the numerical noise associated with the finite number of test particles in ordinary BUU treatment is studied. It is shown that the fingerprints of these instabilities are kept during the evolution because of the relatively long recombination time compared with the typical time scales imposed by the Coulomb repulsion and the possible collective expansion. (author) 5 refs., 12 figs

  1. Distributed construction of quantum fingerprints

    OpenAIRE

    Ambainis, Andris; Shi, Yaoyun

    2003-01-01

    Quantum fingerprints are useful quantum encodings introduced by Buhrman, Cleve, Watrous, and de Wolf (Physical Review Letters, Volume 87, Number 16, Article 167902, 2001; quant-ph/0102001) in obtaining an efficient quantum communication protocol. We design a protocol for constructing the fingerprint in a distributed scenario. As an application, this protocol gives rise to a communication protocol more efficient than the best known classical protocol for a communication problem.

  2. A 600-µW ultra-low-power associative processor for image pattern recognition employing magnetic tunnel junction-based nonvolatile memories with autonomic intelligent power-gating scheme

    Science.gov (United States)

    Ma, Yitao; Miura, Sadahiko; Honjo, Hiroaki; Ikeda, Shoji; Hanyu, Takahiro; Ohno, Hideo; Endoh, Tetsuo

    2016-04-01

    A novel associative processor using magnetic tunnel junction (MTJ)-based nonvolatile memories has been proposed and fabricated under a 90 nm CMOS/70 nm perpendicular-MTJ (p-MTJ) hybrid process for achieving the exceptionally low-power performance of image pattern recognition. A four-transistor 2-MTJ (4T-2MTJ) spin transfer torque magnetoresistive random access memory was adopted to completely eliminate the standby power. A self-directed intelligent power-gating (IPG) scheme specialized for this associative processor is employed to optimize the operation power by only autonomously activating currently accessed memory cells. The operations of a prototype chip at 20 MHz are demonstrated by measurement. The proposed processor can successfully carry out single texture pattern matching within 6.5 µs using 128-dimension bag-of-feature patterns, and the measured average operation power of the entire processor core is only 600 µW. Compared with the twin chip designed with 6T static random access memory, 91.2% power reductions are achieved. More than 88.0% power reductions are obtained compared with the latest associative memories. The further power performance analysis is discussed in detail, which verifies the special superiority of the proposed processor in power consumption for large-capacity memory-based VLSI systems.

  3. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  4. Robust efficient video fingerprinting

    Science.gov (United States)

    Puri, Manika; Lubin, Jeffrey

    2009-02-01

    We have developed a video fingerprinting system with robustness and efficiency as the primary and secondary design criteria. In extensive testing, the system has shown robustness to cropping, letter-boxing, sub-titling, blur, drastic compression, frame rate changes, size changes and color changes, as well as to the geometric distortions often associated with camcorder capture in cinema settings. Efficiency is afforded by a novel two-stage detection process in which a fast matching process first computes a number of likely candidates, which are then passed to a second slower process that computes the overall best match with minimal false alarm probability. One key component of the algorithm is a maximally stable volume computation - a three-dimensional generalization of maximally stable extremal regions - that provides a content-centric coordinate system for subsequent hash function computation, independent of any affine transformation or extensive cropping. Other key features include an efficient bin-based polling strategy for initial candidate selection, and a final SIFT feature-based computation for final verification. We describe the algorithm and its performance, and then discuss additional modifications that can provide further improvement to efficiency and accuracy.

  5. Transparent Fingerprint Sensor System for Large Flat Panel Display

    Directory of Open Access Journals (Sweden)

    Wonkuk Seo

    2018-01-01

    Full Text Available In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO TFT sensor array and associated custom Read-Out IC (ROIC are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC. To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger’s ridges and valleys through the fingerprint sensor array.

  6. Transparent Fingerprint Sensor System for Large Flat Panel Display.

    Science.gov (United States)

    Seo, Wonkuk; Pi, Jae-Eun; Cho, Sung Haeung; Kang, Seung-Youl; Ahn, Seong-Deok; Hwang, Chi-Sun; Jeon, Ho-Sik; Kim, Jong-Uk; Lee, Myunghee

    2018-01-19

    In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT) sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO) TFT sensor array and associated custom Read-Out IC (ROIC) are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE) amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC). To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger's ridges and valleys through the fingerprint sensor array.

  7. CSI Frequency Domain Fingerprint-Based Passive Indoor Human Detection

    Directory of Open Access Journals (Sweden)

    Chong Han

    2018-04-01

    Full Text Available Passive indoor personnel detection technology is now a hot topic. Existing methods have been greatly influenced by environmental changes, and there are problems with the accuracy and robustness of detection. Passive personnel detection based on Wi-Fi not only solves the above problems, but also has the advantages of being low cost and easy to implement, and can be better applied to elderly care and safety monitoring. In this paper, we propose a passive indoor personnel detection method based on Wi-Fi, which we call FDF-PIHD (Frequency Domain Fingerprint-based Passive Indoor Human Detection. Through this method, fine-grained physical layer Channel State Information (CSI can be extracted to generate feature fingerprints so as to help determine the state in the scene by matching online fingerprints with offline fingerprints. In order to improve accuracy, we combine the detection results of three receiving antennas to obtain the final test result. The experimental results show that the detection rates of our proposed scheme all reach above 90%, no matter whether the scene is human-free, stationary or a moving human presence. In addition, it can not only detect whether there is a target indoors, but also determine the current state of the target.

  8. The Development Of Mathematical Model For Automated Fingerprint Identification Systems Analysis

    International Nuclear Information System (INIS)

    Ardisasmita, M. Syamsa

    2001-01-01

    Fingerprint has a strong oriented and periodic structure composed of dark lines of raised skin (ridges) and clear lines of lowered skin (furrows)that twist to form a distinct pattern. Although the manner in which the ridges flow is distinctive, other characteristics of the fingerprint called m inutiae a re what are most unique to the individual. These features are particular patterns consisting of terminations or bifurcations of the ridges. To assert if two fingerprints are from the same finger or not, experts detect those minutiae. AFIS (Automated Fingerprint Identification Systems) extract and compare these features for determining a match. The classic methods of fingerprints recognition are not suitable for direct implementation in form of computer algorithms. The creation of a finger's model was however the necessity of development of new, better algorithms of analysis. This paper presents a new numerical methods of fingerprints' simulation based on mathematical model of arrangement of dermatoglyphics and creation of minutiae. This paper describes also the design and implementation of an automated fingerprint identification systems which operates in two stages: minutiae extraction and minutiae matching

  9. Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode

    Directory of Open Access Journals (Sweden)

    Yong Cai

    2015-01-01

    Full Text Available Chemical fingerprinting is currently a widely used tool that enables rapid and accurate quality evaluation of Traditional Chinese Medicine (TCM. However, chemical fingerprints are not amenable to information storage, recognition, and retrieval, which limit their use in Chinese medicine traceability. In this study, samples of three kinds of Chinese medicines were randomly selected and chemical fingerprints were then constructed by using high performance liquid chromatography. Based on chemical data, the process of converting the TCM chemical fingerprint into two-dimensional code is presented; preprocess and filtering algorithm are also proposed aiming at standardizing the large amount of original raw data. In order to know which type of two-dimensional code (2D is suitable for storing data of chemical fingerprints, current popular types of 2D codes are analyzed and compared. Results show that QR Code is suitable for recording the TCM chemical fingerprint. The fingerprint information of TCM can be converted into data format that can be stored as 2D code for traceability and quality control.

  10. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  11. Electronic fingerprinting of the dead.

    Science.gov (United States)

    Rutty, G N; Stringer, K; Turk, E E

    2008-01-01

    To date, a number of methods exist for the capture of fingerprints from cadavers that can then be used in isolation as a primary method for the identification of the dead. We report the use of a handheld, mobile wireless unit used in conjunction with a personal digital assistant (PDA) device for the capture of fingerprints from the dead. We also consider a handheld single-digit fingerprint scanner that utilises a USB laptop connection for the electronic capture of cadaveric fingerprints. Both are single-operator units that, if ridge detail is preserved, can collect a 10-set of finger pad prints in approximately 45 and 90 s, respectively. We present our observations on the restrictions as to when such devices can be used with cadavers. We do, however, illustrate that the images are of sufficient quality to allow positive identification from finger pad prints of the dead. With the development of mobile, handheld, biometric, PDA-based units for the police, we hypothesize that, under certain circumstances, devices such as these could be used for the accelerated acquisition of fingerprint identification data with the potential for rapid near-patient identification in the future.

  12. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

    Science.gov (United States)

    Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang

    The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.

  13. On the introduction of secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available The concept of fingerprint classification is an important one because of the need to, before executing a database search procedure, virtually break the fingerprint template database into smaller, manageable partitions. This is done in order to avoid...

  14. Fingerprint separation: an application of ICA

    Science.gov (United States)

    Singh, Meenakshi; Singh, Deepak Kumar; Kalra, Prem Kumar

    2008-04-01

    Among all existing biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Fingerprint-based identification is the most recognized tool in biometrics because of its reliability and accuracy. Fingerprint identification is done by matching questioned and known friction skin ridge impressions from fingers, palms, and toes to determine if the impressions are from the same finger (or palm, toe, etc.). There are many fingerprint matching algorithms which automate and facilitate the job of fingerprint matching, but for any of these algorithms matching can be difficult if the fingerprints are overlapped or mixed. In this paper, we have proposed a new algorithm for separating overlapped or mixed fingerprints so that the performance of the matching algorithms will improve when they are fed with these inputs. Independent Component Analysis (ICA) has been used as a tool to separate the overlapped or mixed fingerprints.

  15. Fingerprint fake detection by optical coherence tomography

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  16. Colour schemes

    DEFF Research Database (Denmark)

    van Leeuwen, Theo

    2013-01-01

    This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation.......This chapter presents a framework for analysing colour schemes based on a parametric approach that includes not only hue, value and saturation, but also purity, transparency, luminosity, luminescence, lustre, modulation and differentiation....

  17. Entropy based fingerprint for local crystalline order

    Science.gov (United States)

    Piaggi, Pablo M.; Parrinello, Michele

    2017-09-01

    We introduce a new fingerprint that allows distinguishing between liquid-like and solid-like atomic environments. This fingerprint is based on an approximate expression for the entropy projected on individual atoms. When combined with local enthalpy, this fingerprint acquires an even finer resolution and it is capable of discriminating between different crystal structures.

  18. Fingerprint Analysis with Marked Point Processes

    DEFF Research Database (Denmark)

    Forbes, Peter G. M.; Lauritzen, Steffen; Møller, Jesper

    We present a framework for fingerprint matching based on marked point process models. An efficient Monte Carlo algorithm is developed to calculate the marginal likelihood ratio for the hypothesis that two observed prints originate from the same finger against the hypothesis that they originate from...... different fingers. Our model achieves good performance on an NIST-FBI fingerprint database of 258 matched fingerprint pairs....

  19. Forensic Chemistry: The Revelation of Latent Fingerprints

    Science.gov (United States)

    Friesen, J. Brent

    2015-01-01

    The visualization of latent fingerprints often involves the use of a chemical substance that creates a contrast between the fingerprint residues and the surface on which the print was deposited. The chemical-aided visualization techniques can be divided into two main categories: those that chemically react with the fingerprint residue and those…

  20. Sex Determination from Fingerprint Ridge Density | Gungadin ...

    African Journals Online (AJOL)

    This study was conducted with an aim to establish a relationship between sex and fingerprint ridge density. The fingerprints were taken from 500 subjects (250 males and 250 females) in the age group of 18-60 years. After taking fingerprints, the ridges were counted in the upper portion of the radial border of each print for all ...

  1. Efficient iris recognition by characterizing key local variations.

    Science.gov (United States)

    Ma, Li; Tan, Tieniu; Wang, Yunhong; Zhang, Dexin

    2004-06-01

    Unlike other biometrics such as fingerprints and face, the distinct aspect of iris comes from randomly distributed features. This leads to its high reliability for personal identification, and at the same time, the difficulty in effectively representing such details in an image. This paper describes an efficient algorithm for iris recognition by characterizing key local variations. The basic idea is that local sharp variation points, denoting the appearing or vanishing of an important image structure, are utilized to represent the characteristics of the iris. The whole procedure of feature extraction includes two steps: 1) a set of one-dimensional intensity signals is constructed to effectively characterize the most important information of the original two-dimensional image; 2) using a particular class of wavelets, a position sequence of local sharp variation points in such signals is recorded as features. We also present a fast matching scheme based on exclusive OR operation to compute the similarity between a pair of position sequences. Experimental results on 2255 iris images show that the performance of the proposed method is encouraging and comparable to the best iris recognition algorithm found in the current literature.

  2. Forensic comparison and matching of fingerprints: using quantitative image measures for estimating error rates through understanding and predicting difficulty.

    Directory of Open Access Journals (Sweden)

    Philip J Kellman

    Full Text Available Latent fingerprint examination is a complex task that, despite advances in image processing, still fundamentally depends on the visual judgments of highly trained human examiners. Fingerprints collected from crime scenes typically contain less information than fingerprints collected under controlled conditions. Specifically, they are often noisy and distorted and may contain only a portion of the total fingerprint area. Expertise in fingerprint comparison, like other forms of perceptual expertise, such as face recognition or aircraft identification, depends on perceptual learning processes that lead to the discovery of features and relations that matter in comparing prints. Relatively little is known about the perceptual processes involved in making comparisons, and even less is known about what characteristics of fingerprint pairs make particular comparisons easy or difficult. We measured expert examiner performance and judgments of difficulty and confidence on a new fingerprint database. We developed a number of quantitative measures of image characteristics and used multiple regression techniques to discover objective predictors of error as well as perceived difficulty and confidence. A number of useful predictors emerged, and these included variables related to image quality metrics, such as intensity and contrast information, as well as measures of information quantity, such as the total fingerprint area. Also included were configural features that fingerprint experts have noted, such as the presence and clarity of global features and fingerprint ridges. Within the constraints of the overall low error rates of experts, a regression model incorporating the derived predictors demonstrated reasonable success in predicting objective difficulty for print pairs, as shown both in goodness of fit measures to the original data set and in a cross validation test. The results indicate the plausibility of using objective image metrics to predict expert

  3. Forensic comparison and matching of fingerprints: using quantitative image measures for estimating error rates through understanding and predicting difficulty.

    Science.gov (United States)

    Kellman, Philip J; Mnookin, Jennifer L; Erlikhman, Gennady; Garrigan, Patrick; Ghose, Tandra; Mettler, Everett; Charlton, David; Dror, Itiel E

    2014-01-01

    Latent fingerprint examination is a complex task that, despite advances in image processing, still fundamentally depends on the visual judgments of highly trained human examiners. Fingerprints collected from crime scenes typically contain less information than fingerprints collected under controlled conditions. Specifically, they are often noisy and distorted and may contain only a portion of the total fingerprint area. Expertise in fingerprint comparison, like other forms of perceptual expertise, such as face recognition or aircraft identification, depends on perceptual learning processes that lead to the discovery of features and relations that matter in comparing prints. Relatively little is known about the perceptual processes involved in making comparisons, and even less is known about what characteristics of fingerprint pairs make particular comparisons easy or difficult. We measured expert examiner performance and judgments of difficulty and confidence on a new fingerprint database. We developed a number of quantitative measures of image characteristics and used multiple regression techniques to discover objective predictors of error as well as perceived difficulty and confidence. A number of useful predictors emerged, and these included variables related to image quality metrics, such as intensity and contrast information, as well as measures of information quantity, such as the total fingerprint area. Also included were configural features that fingerprint experts have noted, such as the presence and clarity of global features and fingerprint ridges. Within the constraints of the overall low error rates of experts, a regression model incorporating the derived predictors demonstrated reasonable success in predicting objective difficulty for print pairs, as shown both in goodness of fit measures to the original data set and in a cross validation test. The results indicate the plausibility of using objective image metrics to predict expert performance and

  4. Fighting identity theft with advances in fingerprint recognition

    CSIR Research Space (South Africa)

    Mathekga, D

    2015-10-01

    Full Text Available The ease with which the green South African ID book could be forged has led to many instances of identity fraud, costing retail businesses millions in lost revenue on fraudulently created credit accounts. This has led the government, through...

  5. Tradable schemes

    NARCIS (Netherlands)

    J.K. Hoogland (Jiri); C.D.D. Neumann

    2000-01-01

    textabstractIn this article we present a new approach to the numerical valuation of derivative securities. The method is based on our previous work where we formulated the theory of pricing in terms of tradables. The basic idea is to fit a finite difference scheme to exact solutions of the pricing

  6. A topology based approach to categorization of fingerprint images

    DEFF Research Database (Denmark)

    Aabrandt, A.; Olsen, M. A.; Busch, C.

    2012-01-01

    , an image is viewed as a triangulated point cloud and the topology associated with this construct is summarized using its first betti number - a number that indicates the number of distinct cycles in the triangulation associated to the particular image. This number is then compared against the first betti...... numbers of “n” prototype images in order to perform classification (“fingerprint” vs “non-fingerprint”). The proposed method is compared against SIVV (a tool provided by NIST). Experimental results on fingerprint and iris databases demonstrate the potential of the scheme....

  7. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  8. Pattern recognition

    CERN Document Server

    Theodoridis, Sergios

    2003-01-01

    Pattern recognition is a scientific discipline that is becoming increasingly important in the age of automation and information handling and retrieval. Patter Recognition, 2e covers the entire spectrum of pattern recognition applications, from image analysis to speech recognition and communications. This book presents cutting-edge material on neural networks, - a set of linked microprocessors that can form associations and uses pattern recognition to ""learn"" -and enhances student motivation by approaching pattern recognition from the designer's point of view. A direct result of more than 10

  9. A Novel Iris Segmentation Scheme

    Directory of Open Access Journals (Sweden)

    Chen-Chung Liu

    2014-01-01

    Full Text Available One of the key steps in the iris recognition system is the accurate iris segmentation from its surrounding noises including pupil, sclera, eyelashes, and eyebrows of a captured eye-image. This paper presents a novel iris segmentation scheme which utilizes the orientation matching transform to outline the outer and inner iris boundaries initially. It then employs Delogne-Kåsa circle fitting (instead of the traditional Hough transform to further eliminate the outlier points to extract a more precise iris area from an eye-image. In the extracted iris region, the proposed scheme further utilizes the differences in the intensity and positional characteristics of the iris, eyelid, and eyelashes to detect and delete these noises. The scheme is then applied on iris image database, UBIRIS.v1. The experimental results show that the presented scheme provides a more effective and efficient iris segmentation than other conventional methods.

  10. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Science.gov (United States)

    Chen, Chi-Jim; Pai, Tun-Wen; Cheng, Mox

    2015-01-01

    A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS), successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM), based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates. PMID:25835186

  11. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Directory of Open Access Journals (Sweden)

    Chi-Jim Chen

    2015-03-01

    Full Text Available A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS, successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM, based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates.

  12. Graphene Nanopres for DNA Fingerprinting

    Science.gov (United States)

    Ahmed, Towfiq; Balatsky, Alexander V.; Haraldsen, J. T.; Schuller, Ivan K.; di Ventra, M.; Wikfeldt, K. T.

    2013-03-01

    The recent progress in nanopore experiments with transverse current is important for the development of fast, accurate and cheap finger-printing techniques for single nucleotide. Despite its enormous potential for the next generation DNA sequencing technology, the presence of large noise in the temporal spectrum of transverse current remains a big challenge for getting highly accurate interpretation of data. In this paper we present our abinitio calculations, and propose graphene based device for DNA fingerprinting. We calculate transmission current through graphene for each DNA base (A,C,G,T). As shown in our work, a proper time-series analysis of a signal provides a higher quality information in identifying single bio-molecule is translocating through the nanopores. This work is supported by LANL, Nordita, US DOE, AFOSR, and NIH.

  13. A Computational Discriminability Analysis on Twin Fingerprints

    Science.gov (United States)

    Liu, Yu; Srihari, Sargur N.

    Sharing similar genetic traits makes the investigation of twins an important study in forensics and biometrics. Fingerprints are one of the most commonly found types of forensic evidence. The similarity between twins’ prints is critical establish to the reliability of fingerprint identification. We present a quantitative analysis of the discriminability of twin fingerprints on a new data set (227 pairs of identical twins and fraternal twins) recently collected from a twin population using both level 1 and level 2 features. Although the patterns of minutiae among twins are more similar than in the general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.

  14. Machine-assisted verification of latent fingerprints: first results for nondestructive contact-less optical acquisition techniques with a CWL sensor

    Science.gov (United States)

    Hildebrandt, Mario; Kiltz, Stefan; Krapyvskyy, Dmytro; Dittmann, Jana; Vielhauer, Claus; Leich, Marcus

    2011-11-01

    A machine-assisted analysis of traces from crime scenes might be possible with the advent of new high-resolution non-destructive contact-less acquisition techniques for latent fingerprints. This requires reliable techniques for the automatic extraction of fingerprint features from latent and exemplar fingerprints for matching purposes using pattern recognition approaches. Therefore, we evaluate the NIST Biometric Image Software for the feature extraction and verification of contact-lessly acquired latent fingerprints to determine potential error rates. Our exemplary test setup includes 30 latent fingerprints from 5 people in two test sets that are acquired from different surfaces using a chromatic white light sensor. The first test set includes 20 fingerprints on two different surfaces. It is used to determine the feature extraction performance. The second test set includes one latent fingerprint on 10 different surfaces and an exemplar fingerprint to determine the verification performance. This utilized sensing technique does not require a physical or chemical visibility enhancement of the fingerprint residue, thus the original trace remains unaltered for further investigations. No particular feature extraction and verification techniques have been applied to such data, yet. Hence, we see the need for appropriate algorithms that are suitable to support forensic investigations.

  15. OPTIMAL EXPERIMENT DESIGN FOR MAGNETIC RESONANCE FINGERPRINTING

    OpenAIRE

    Zhao, Bo; Haldar, Justin P.; Setsompop, Kawin; Wald, Lawrence L.

    2016-01-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cram��r-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experi...

  16. Study on internal to surface fingerprint correlation using optical coherence tomography and internal fingerprint extraction

    CSIR Research Space (South Africa)

    Darlow, LN

    2015-11-01

    Full Text Available of, the above-mentioned works. Internal fingerprint zone detection is an improvement as it uses fuzzy c-means to improve clustering performance, uses better cluster result postprocessing, and improves upon the fine-tuning procedure through... Internal fingerprint extraction consists of two main parts: fingerprint zone detection and extraction. Zone detection uses fuzzy c-means clustering to approximate the location of the papillary junction (i.e., the internal fingerprint zone). Edge detection...

  17. High Resolution Ultrasonic Method for 3D Fingerprint Recognizable Characteristics in Biometrics Identification

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Yu.; Maeva, A.; Severin, F.

    Biometrics is a rapidly evolving scientific and applied discipline that studies possible ways of personal identification by means of unique biological characteristics. Such identification is important in various situations requiring restricted access to certain areas, information and personal data and for cases of medical emergencies. A number of automated biometric techniques have been developed, including fingerprint, hand shape, eye and facial recognition, thermographic imaging, etc. All these techniques differ in the recognizable parameters, usability, accuracy and cost. Among these, fingerprint recognition stands alone since a very large database of fingerprints has already been acquired. Also, fingerprints are key evidence left at a crime scene and can be used to indentify suspects. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. We introduce a newer development of the ultrasonic fingerprint imaging. The proposed method obtains a scan only once and then varies the C-scan gate position and width to visualize acoustic reflections from any appropriate depth inside the skin. Also, B-scans and A-scans can be recreated from any position using such data array, which gives the control over the visualization options. By setting the C-scan gate deeper inside the skin, distribution of the sweat pores (which are located along the ridges) can be easily visualized. This distribution should be unique for each individual so this provides a means of personal identification, which is not affected by any changes (accidental or intentional) of the fingers' surface conditions. This paper discusses different setups, acoustic parameters of the system, signal and image processing options and possible ways of 3-dimentional visualization that could be used as a recognizable characteristic in biometric identification.

  18. Magnetic Resonance Fingerprinting - a promising new approach to obtain standardized imaging biomarkers from MRI.

    Science.gov (United States)

    2015-04-01

    Current routine MRI examinations rely on the acquisition of qualitative images that have a contrast "weighted" for a mixture of (magnetic) tissue properties. Recently, a novel approach was introduced, namely MR Fingerprinting (MRF) with a completely different approach to data acquisition, post-processing and visualization. Instead of using a repeated, serial acquisition of data for the characterization of individual parameters of interest, MRF uses a pseudo randomized acquisition that causes the signals from different tissues to have a unique signal evolution or 'fingerprint' that is simultaneously a function of the multiple material properties under investigation. The processing after acquisition involves a pattern recognition algorithm to match the fingerprints to a predefined dictionary of predicted signal evolutions. These can then be translated into quantitative maps of the magnetic parameters of interest. MR Fingerprinting (MRF) is a technique that could theoretically be applied to most traditional qualitative MRI methods and replaces them with acquisition of truly quantitative tissue measures. MRF is, thereby, expected to be much more accurate and reproducible than traditional MRI and should improve multi-center studies and significantly reduce reader bias when diagnostic imaging is performed. Key Points • MR fingerprinting (MRF) is a new approach to data acquisition, post-processing and visualization.• MRF provides highly accurate quantitative maps of T1, T2, proton density, diffusion.• MRF may offer multiparametric imaging with high reproducibility, and high potential for multicenter/ multivendor studies.

  19. Recognition Errors Control in Biometric Identification Cryptosystems

    Directory of Open Access Journals (Sweden)

    Vladimir Ivanovich Vasilyev

    2015-06-01

    Full Text Available The method of biometric cryptosystem designed on the basis of fuzzy extractor, in which main disadvantages of biometric and cryptographic systems are absent, is considered. The main idea of this work is a control of identity recognition errors with use of fuzzy extractor which operates with Reed – Solomon correcting code. The fingerprint features vector is considered as a biometric user identifier.

  20. DNA Fingerprinting in a Forensic Teaching Experiment

    Science.gov (United States)

    Wagoner, Stacy A.; Carlson, Kimberly A.

    2008-01-01

    This article presents an experiment designed to provide students, in a classroom laboratory setting, a hands-on demonstration of the steps used in DNA forensic analysis by performing DNA extraction, DNA fingerprinting, and statistical analysis of the data. This experiment demonstrates how DNA fingerprinting is performed and how long it takes. It…

  1. Extracting subsurface fingerprints using optical coherence tomography

    CSIR Research Space (South Africa)

    Akhoury, SS

    2015-02-01

    Full Text Available Subsurface Fingerprints using Optical Coherence Tomography Sharat Saurabh Akhoury, Luke Nicholas Darlow Modelling and Digital Science, Council for Scientific and Industrial Research, Pretoria, South Africa Abstract Physiologists have found... approach to extract the subsurface fingerprint representation using a high-resolution imaging technology known as Optical Coherence Tomography (OCT). ...

  2. Tools for quality control of fingerprint databases

    Science.gov (United States)

    Swann, B. Scott; Libert, John M.; Lepley, Margaret A.

    2010-04-01

    Integrity of fingerprint data is essential to biometric and forensic applications. Accordingly, the FBI's Criminal Justice Information Services (CJIS) Division has sponsored development of software tools to facilitate quality control functions relative to maintaining its fingerprint data assets inherent to the Integrated Automated Fingerprint Identification System (IAFIS) and Next Generation Identification (NGI). This paper provides an introduction of two such tools. The first FBI-sponsored tool was developed by the National Institute of Standards and Technology (NIST) and examines and detects the spectral signature of the ridge-flow structure characteristic of friction ridge skin. The Spectral Image Validation/Verification (SIVV) utility differentiates fingerprints from non-fingerprints, including blank frames or segmentation failures erroneously included in data; provides a "first look" at image quality; and can identify anomalies in sample rates of scanned images. The SIVV utility might detect errors in individual 10-print fingerprints inaccurately segmented from the flat, multi-finger image acquired by one of the automated collection systems increasing in availability and usage. In such cases, the lost fingerprint can be recovered by re-segmentation from the now compressed multi-finger image record. The second FBI-sponsored tool, CropCoeff was developed by MITRE and thoroughly tested via NIST. CropCoeff enables cropping of the replacement single print directly from the compressed data file, thus avoiding decompression and recompression of images that might degrade fingerprint features necessary for matching.

  3. Predicting the performance of fingerprint similarity searching.

    Science.gov (United States)

    Vogt, Martin; Bajorath, Jürgen

    2011-01-01

    Fingerprints are bit string representations of molecular structure that typically encode structural fragments, topological features, or pharmacophore patterns. Various fingerprint designs are utilized in virtual screening and their search performance essentially depends on three parameters: the nature of the fingerprint, the active compounds serving as reference molecules, and the composition of the screening database. It is of considerable interest and practical relevance to predict the performance of fingerprint similarity searching. A quantitative assessment of the potential that a fingerprint search might successfully retrieve active compounds, if available in the screening database, would substantially help to select the type of fingerprint most suitable for a given search problem. The method presented herein utilizes concepts from information theory to relate the fingerprint feature distributions of reference compounds to screening libraries. If these feature distributions do not sufficiently differ, active database compounds that are similar to reference molecules cannot be retrieved because they disappear in the "background." By quantifying the difference in feature distribution using the Kullback-Leibler divergence and relating the divergence to compound recovery rates obtained for different benchmark classes, fingerprint search performance can be quantitatively predicted.

  4. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  5. Chemical fingerprints encode mother–offspring similarity, colony membership, relatedness, and genetic quality in fur seals

    Science.gov (United States)

    Stoffel, Martin A.; Caspers, Barbara A.; Forcada, Jaume; Giannakara, Athina; Baier, Markus; Eberhart-Phillips, Luke; Müller, Caroline; Hoffman, Joseph I.

    2015-01-01

    Chemical communication underpins virtually all aspects of vertebrate social life, yet remains poorly understood because of its highly complex mechanistic basis. We therefore used chemical fingerprinting of skin swabs and genetic analysis to explore the chemical cues that may underlie mother–offspring recognition in colonially breeding Antarctic fur seals. By sampling mother–offspring pairs from two different colonies, using a variety of statistical approaches and genotyping a large panel of microsatellite loci, we show that colony membership, mother–offspring similarity, heterozygosity, and genetic relatedness are all chemically encoded. Moreover, chemical similarity between mothers and offspring reflects a combination of genetic and environmental influences, the former partly encoded by substances resembling known pheromones. Our findings reveal the diversity of information contained within chemical fingerprints and have implications for understanding mother–offspring communication, kin recognition, and mate choice. PMID:26261311

  6. Integrated fingerprinting in secure digital cinema projection

    Science.gov (United States)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  7. Can soft biometric traits assist user recognition?

    Science.gov (United States)

    Jain, Anil K.; Dass, Sarat C.; Nandakumar, Karthik

    2004-08-01

    Biometrics is rapidly gaining acceptance as the technology that can meet the ever increasing need for security in critical applications. Biometric systems automatically recognize individuals based on their physiological and behavioral characteristics. Hence, the fundamental requirement of any biometric recognition system is a human trait having several desirable properties like universality, distinctiveness, permanence, collectability, acceptability, and resistance to circumvention. However, a human characteristic that possesses all these properties has not yet been identified. As a result, none of the existing biometric systems provide perfect recognition and there is a scope for improving the performance of these systems. Although characteristics like gender, ethnicity, age, height, weight and eye color are not unique and reliable, they provide some information about the user. We refer to these characteristics as "soft" biometric traits and argue that these traits can complement the identity information provided by the primary biometric identifiers like fingerprint and face. This paper presents the motivation for utilizing soft biometric information and analyzes how the soft biometric traits can be automatically extracted and incorporated in the decision making process of the primary biometric system. Preliminary experiments were conducted on a fingerprint database of 160 users by synthetically generating soft biometric traits like gender, ethnicity, and height based on known statistics. The results show that the use of additional soft biometric user information significantly improves (approximately 6%) the recognition performance of the fingerprint biometric system.

  8. DNA fingerprints come to court

    International Nuclear Information System (INIS)

    Anon.

    1988-01-01

    DNA fingerprinting, a new technique, which produces a visual representation of a person's genome, enables the identification of perpetrators from as little as a single hair root, providing they have left some biologic evidence-hair, skin cells, blood, or semen-at the scene of the crime. DNA fingerprinting was developed by British geneticist Alec Jeffreys, PhD, in 1985. Jeffreys, professor genetics at the University of Leicester, built upon a discovery, five years earlier, of certain hypervariable regions called minisatellites in unexpressed areas of DNA. The hypervariability was evidenced in the number of repetitions of certain sequences of base pairs. It was this aspect that revealed to Jeffreys something that had eluded other investigators. He realized that these minisatellite regions had a potential for identification far greater than that of conventional genetic markers, which are defined by restriction fragment length polymorphisms (RFLPs). RFLPs are characterized by the substitution of one base pair for another, resulting in the presence or absence of a restriction enzyme site. Thus, each offers a limited number of alleles. In contrast, minisatellite regions have an accordion-like range of length, as the number of repetitions of a given sequence varies widely from person to person

  9. Speech Recognition

    Directory of Open Access Journals (Sweden)

    Adrian Morariu

    2009-01-01

    Full Text Available This paper presents a method of speech recognition by pattern recognition techniques. Learning consists in determining the unique characteristics of a word (cepstral coefficients by eliminating those characteristics that are different from one word to another. For learning and recognition, the system will build a dictionary of words by determining the characteristics of each word to be used in the recognition. Determining the characteristics of an audio signal consists in the following steps: noise removal, sampling it, applying Hamming window, switching to frequency domain through Fourier transform, calculating the magnitude spectrum, filtering data, determining cepstral coefficients.

  10. FingerScanner: Embedding a Fingerprint Scanner in a Raspberry Pi

    Directory of Open Access Journals (Sweden)

    Jordi Sapes

    2016-02-01

    Full Text Available Nowadays, researchers are paying increasing attention to embedding systems. Cost reduction has lead to an increase in the number of platforms supporting the operating system Linux, jointly with the Raspberry Pi motherboard. Thus, embedding devices on Raspberry-Linux systems is a goal in order to make competitive commercial products. This paper presents a low-cost fingerprint recognition system embedded into a Raspberry Pi with Linux.

  11. On the use of spectral minutiae in high-resolution palmprint recognition

    NARCIS (Netherlands)

    Wang, Ruifang; Veldhuis, Raymond N.J.; Ramos, Daniel; Spreeuwers, Lieuwe Jan; Fierrez, Julian; Xu, H.

    2013-01-01

    The spectral minutiae representation has been proposed as a novel method to minutiae-based fingerprint recognition, which can handle minutiae translation and rotation and improve matching speed. As high-resolution palmprint recognition is also mainly based on minutiae sets, we apply spectral

  12. Additive operator-difference schemes splitting schemes

    CERN Document Server

    Vabishchevich, Petr N

    2013-01-01

    Applied mathematical modeling isconcerned with solving unsteady problems. This bookshows how toconstruct additive difference schemes to solve approximately unsteady multi-dimensional problems for PDEs. Two classes of schemes are highlighted: methods of splitting with respect to spatial variables (alternating direction methods) and schemes of splitting into physical processes. Also regionally additive schemes (domain decomposition methods)and unconditionally stable additive schemes of multi-component splitting are considered for evolutionary equations of first and second order as well as for sy

  13. Color Textons for Texture Recognition

    NARCIS (Netherlands)

    Burghouts, G.J.; Geusebroek, J.M.

    2006-01-01

    Texton models have proven to be very discriminative for the recognition of grayvalue images taken from rough textures. To further improve the discriminative power of the distinctive texton models of Varma and Zisserman (VZ model) (IJCV, vol. 62(1), pp. 61-81, 2005), we propose two schemes to exploit

  14. ORIENTATION FIELD RECONSTRUCTION OF ALTERED FINGERPRINT USING ORTHOGONAL WAVELETS

    Directory of Open Access Journals (Sweden)

    Mini M.G.

    2016-11-01

    Full Text Available Ridge orientation field is an important feature for fingerprint matching and fingerprint reconstruction. Matching of the altered fingerprint against its unaltered mates can be done by extracting the available features in the altered fingerprint and using it along with approximated ridge orientation. This paper presents a method for approximating ridge orientation field of altered fingerprints. In the proposed method, sine and cosine of doubled orientation of the fingerprint is decomposed using orthogonal wavelets and reconstructed back using only the approximation coefficients. No prior information about the singular points is needed for orientation approximation. The method is found suitable for orientation estimation of low quality fingerprint images also.

  15. Development of oil hydrocarbon fingerprinting and identification techniques

    International Nuclear Information System (INIS)

    Wang Zhendi; Fingas, Merv F.

    2003-01-01

    Oil, refined product, and pyrogenic hydrocarbons are the most frequently discovered contaminants in the environment. To effectively determine the fate of spilled oil in the environment and to successfully identify source(s) of spilled oil and petroleum products is, therefore, extremely important in many oil-related environmental studies and liability cases. This article briefly reviews the recent development of chemical analysis methodologies which are most frequently used in oil spill characterization and identification studies and environmental forensic investigations. The fingerprinting and data interpretation techniques discussed include oil spill identification protocol, tiered analytical approach, generic features and chemical composition of oils, effects of weathering on hydrocarbon fingerprinting, recognition of distribution patterns of petroleum hydrocarbons, oil type screening and differentiation, analysis of 'source-specific marker' compounds, determination of diagnostic ratios of specific oil constituents, stable isotopic analysis, application of various statistical and numerical analysis tools, and application of other analytical techniques. The issue of how biogenic and pyrogenic hydrocarbons are distinguished from petrogenic hydrocarbons is also addressed

  16. Attendance fingerprint identification system using arduino and single board computer

    Science.gov (United States)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  17. Fingerprint re-alignment: a solution based on the true fingerprint center point

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-02-01

    Full Text Available Solution Based on the True Fingerprint Center Point Ishmael S. Msiza, Brain Leke-Betechuoh, and Tendani Malumedzha Biometrics Research Group ? Information Security CSIR, Modelling & Digital Science Unit Pretoria, Republic of South Africa e... with a pattern that belongs to the Tented Arch (TA) fingerprint class. Fingerprints that belong to the TA class have a single core and a single delta, with the core located almost directly above the delta, as depicted in figure 3 (b). Many singular...

  18. Dorsal finger texture recognition: Investigating fixed-length SURF

    DEFF Research Database (Denmark)

    Hartung, Daniel; Kückelhahn, Jesper

    2012-01-01

    We seek to create fixed-length features from dorsal finger skin images extracted by the SURF interest point detector to combine it in the privacy enhancing helper data scheme. The source of the biometric samples is the GUC45 database which features finger vein, fingerprint and dorsal finger skin...

  19. The nature of expertise in fingerprint matching: experts can do a lot with a little.

    Directory of Open Access Journals (Sweden)

    Matthew B Thompson

    Full Text Available Expert decision making often seems impressive, even miraculous. People with genuine expertise in a particular domain can perform quickly and accurately, and with little information. In the series of experiments presented here, we manipulate the amount of "information" available to a group of experts whose job it is to identify the source of crime scene fingerprints. In Experiment 1, we reduced the amount of information available to experts by inverting fingerprint pairs and adding visual noise. There was no evidence for an inversion effect-experts were just as accurate for inverted prints as they were for upright prints-but expert performance with artificially noisy prints was impressive. In Experiment 2, we separated matching and nonmatching print pairs in time. Experts were conservative, but they were still able to discriminate pairs of fingerprints that were separated by five-seconds, even though the task was quite different from their everyday experience. In Experiment 3, we separated the print pairs further in time to test the long-term memory of experts compared to novices. Long-term recognition memory for experts and novices was the same, with both performing around chance. In Experiment 4, we presented pairs of fingerprints quickly to experts and novices in a matching task. Experts were more accurate than novices, particularly for similar nonmatching pairs, and experts were generally more accurate when they had more time. It is clear that experts can match prints accurately when there is reduced visual information, reduced opportunity for direct comparison, and reduced time to engage in deliberate reasoning. These findings suggest that non-analytic processing accounts for a substantial portion of the variance in expert fingerprint matching accuracy. Our conclusion is at odds with general wisdom in fingerprint identification practice and formal training, and at odds with the claims and explanations that are offered in court during expert

  20. The nature of expertise in fingerprint matching: experts can do a lot with a little.

    Science.gov (United States)

    Thompson, Matthew B; Tangen, Jason M

    2014-01-01

    Expert decision making often seems impressive, even miraculous. People with genuine expertise in a particular domain can perform quickly and accurately, and with little information. In the series of experiments presented here, we manipulate the amount of "information" available to a group of experts whose job it is to identify the source of crime scene fingerprints. In Experiment 1, we reduced the amount of information available to experts by inverting fingerprint pairs and adding visual noise. There was no evidence for an inversion effect-experts were just as accurate for inverted prints as they were for upright prints-but expert performance with artificially noisy prints was impressive. In Experiment 2, we separated matching and nonmatching print pairs in time. Experts were conservative, but they were still able to discriminate pairs of fingerprints that were separated by five-seconds, even though the task was quite different from their everyday experience. In Experiment 3, we separated the print pairs further in time to test the long-term memory of experts compared to novices. Long-term recognition memory for experts and novices was the same, with both performing around chance. In Experiment 4, we presented pairs of fingerprints quickly to experts and novices in a matching task. Experts were more accurate than novices, particularly for similar nonmatching pairs, and experts were generally more accurate when they had more time. It is clear that experts can match prints accurately when there is reduced visual information, reduced opportunity for direct comparison, and reduced time to engage in deliberate reasoning. These findings suggest that non-analytic processing accounts for a substantial portion of the variance in expert fingerprint matching accuracy. Our conclusion is at odds with general wisdom in fingerprint identification practice and formal training, and at odds with the claims and explanations that are offered in court during expert testimony.

  1. FINGERPRINT MATCHING BASED ON PORE CENTROIDS

    Directory of Open Access Journals (Sweden)

    S. Malathi

    2011-05-01

    Full Text Available In recent years there has been exponential growth in the use of bio- metrics for user authentication applications. Automated Fingerprint Identification systems have become popular tool in many security and law enforcement applications. Most of these systems rely on minutiae (ridge ending and bifurcation features. With the advancement in sensor technology, high resolution fingerprint images (1000 dpi pro- vide micro level of features (pores that have proven to be useful fea- tures for identification. In this paper, we propose a new strategy for fingerprint matching based on pores by reliably extracting the pore features The extraction of pores is done by Marker Controlled Wa- tershed segmentation method and the centroids of each pore are con- sidered as feature vectors for matching of two fingerprint images. Experimental results shows that the proposed method has better per- formance with lower false rates and higher accuracy.

  2. Optimal experiment design for magnetic resonance fingerprinting.

    Science.gov (United States)

    Bo Zhao; Haldar, Justin P; Setsompop, Kawin; Wald, Lawrence L

    2016-08-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cramér-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experiment design problem based on the CRB to choose a set of acquisition parameters (e.g., flip angles and/or repetition times) that maximizes the signal-to-noise ratio efficiency of the resulting experiment. The utility of the proposed approach is validated by numerical studies. Representative results demonstrate that the optimized experiments allow for substantial reduction in the length of an MR fingerprinting acquisition, and substantial improvement in parameter estimation performance.

  3. Ferroelastic Fingerprints in Methylammonium Lead Iodide Perovskite

    KAUST Repository

    Hermes, Ilka M.; Bretschneider, Simon A.; Bergmann, Victor W.; Li, Dan; Klasen, Alexander; Mars, Julian; Tremel, Wolfgang; Laquai, Fré dé ric; Butt, Hans-Jü rgen; Mezger, Markus; Berger, Rü diger; Rodriguez, Brian J.; Weber, Stefan A. L.

    2016-01-01

    sample orientations with x-ray diffraction, the preferred domain orientation was suggested to be the a1-a2-phase. The observation of these ferroelastic fingerprints appears to strongly depend on the film texture and thus the preparation route

  4. A medium resolution fingerprint matching system

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2013-09-01

    Full Text Available In this paper, a novel minutiae based fingerprint matching system is proposed. The system is suitable for medium resolution fingerprint images obtained by low cost commercial sensors. The paper presents a new thinning algorithm, a new features extraction and representation, and a novel feature distance matching algorithm. The proposed system is rotation and translation invariant and is suitable for complete or partial fingerprint matching. The proposed algorithms are optimized to be executed on low resource environments both in CPU power and memory space. The system was evaluated using a standard fingerprint dataset and good performance and accuracy were achieved under certain image quality requirements. In addition, the proposed system was compared favorably to that of the state of the art systems.

  5. Low-Speed Fingerprint Image Capture System User`s Guide, June 1, 1993

    Energy Technology Data Exchange (ETDEWEB)

    Whitus, B.R.; Goddard, J.S.; Jatko, W.B.; Manges, W.W.; Treece, D.A.

    1993-06-01

    The Low-Speed Fingerprint Image Capture System (LS-FICS) uses a Sun workstation controlling a Lenzar ElectroOptics Opacity 1000 imaging system to digitize fingerprint card images to support the Federal Bureau of Investigation`s (FBI`s) Automated Fingerprint Identification System (AFIS) program. The system also supports the operations performed by the Oak Ridge National Laboratory- (ORNL-) developed Image Transmission Network (ITN) prototype card scanning system. The input to the system is a single FBI fingerprint card of the agreed-upon standard format and a user-specified identification number. The output is a file formatted to be compatible with the National Institute of Standards and Technology (NIST) draft standard for fingerprint data exchange dated June 10, 1992. These NIST compatible files contain the required print and text images. The LS-FICS is designed to provide the FBI with the capability of scanning fingerprint cards into a digital format. The FBI will replicate the system to generate a data base of test images. The Host Workstation contains the image data paths and the compression algorithm. A local area network interface, disk storage, and tape drive are used for the image storage and retrieval, and the Lenzar Opacity 1000 scanner is used to acquire the image. The scanner is capable of resolving 500 pixels/in. in both x and y directions. The print images are maintained in full 8-bit gray scale and compressed with an FBI-approved wavelet-based compression algorithm. The text fields are downsampled to 250 pixels/in. and 2-bit gray scale. The text images are then compressed using a lossless Huffman coding scheme. The text fields retrieved from the output files are easily interpreted when displayed on the screen. Detailed procedures are provided for system calibration and operation. Software tools are provided to verify proper system operation.

  6. DNA fingerprinting in botany: past, present, future

    OpenAIRE

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-01

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67–73 and Nature 1985, 316:76–79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the n...

  7. Optimal Face-Iris Multimodal Fusion Scheme

    Directory of Open Access Journals (Sweden)

    Omid Sharifi

    2016-06-01

    Full Text Available Multimodal biometric systems are considered a way to minimize the limitations raised by single traits. This paper proposes new schemes based on score level, feature level and decision level fusion to efficiently fuse face and iris modalities. Log-Gabor transformation is applied as the feature extraction method on face and iris modalities. At each level of fusion, different schemes are proposed to improve the recognition performance and, finally, a combination of schemes at different fusion levels constructs an optimized and robust scheme. In this study, CASIA Iris Distance database is used to examine the robustness of all unimodal and multimodal schemes. In addition, Backtracking Search Algorithm (BSA, a novel population-based iterative evolutionary algorithm, is applied to improve the recognition accuracy of schemes by reducing the number of features and selecting the optimized weights for feature level and score level fusion, respectively. Experimental results on verification rates demonstrate a significant improvement of proposed fusion schemes over unimodal and multimodal fusion methods.

  8. Large-scale systematic analysis of 2D fingerprint methods and parameters to improve virtual screening enrichments.

    Science.gov (United States)

    Sastry, Madhavi; Lowrie, Jeffrey F; Dixon, Steven L; Sherman, Woody

    2010-05-24

    A systematic virtual screening study on 11 pharmaceutically relevant targets has been conducted to investigate the interrelation between 8 two-dimensional (2D) fingerprinting methods, 13 atom-typing schemes, 13 bit scaling rules, and 12 similarity metrics using the new cheminformatics package Canvas. In total, 157 872 virtual screens were performed to assess the ability of each combination of parameters to identify actives in a database screen. In general, fingerprint methods, such as MOLPRINT2D, Radial, and Dendritic that encode information about local environment beyond simple linear paths outperformed other fingerprint methods. Atom-typing schemes with more specific information, such as Daylight, Mol2, and Carhart were generally superior to more generic atom-typing schemes. Enrichment factors across all targets were improved considerably with the best settings, although no single set of parameters performed optimally on all targets. The size of the addressable bit space for the fingerprints was also explored, and it was found to have a substantial impact on enrichments. Small bit spaces, such as 1024, resulted in many collisions and in a significant degradation in enrichments compared to larger bit spaces that avoid collisions.

  9. An effective one-dimensional anisotropic fingerprint enhancement algorithm

    Science.gov (United States)

    Ye, Zhendong; Xie, Mei

    2012-01-01

    Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.

  10. Multiscale reconstruction for MR fingerprinting.

    Science.gov (United States)

    Pierre, Eric Y; Ma, Dan; Chen, Yong; Badve, Chaitra; Griswold, Mark A

    2016-06-01

    To reduce the acquisition time needed to obtain reliable parametric maps with Magnetic Resonance Fingerprinting. An iterative-denoising algorithm is initialized by reconstructing the MRF image series at low image resolution. For subsequent iterations, the method enforces pixel-wise fidelity to the best-matching dictionary template then enforces fidelity to the acquired data at slightly higher spatial resolution. After convergence, parametric maps with desirable spatial resolution are obtained through template matching of the final image series. The proposed method was evaluated on phantom and in vivo data using the highly undersampled, variable-density spiral trajectory and compared with the original MRF method. The benefits of additional sparsity constraints were also evaluated. When available, gold standard parameter maps were used to quantify the performance of each method. The proposed approach allowed convergence to accurate parametric maps with as few as 300 time points of acquisition, as compared to 1000 in the original MRF work. Simultaneous quantification of T1, T2, proton density (PD), and B0 field variations in the brain was achieved in vivo for a 256 × 256 matrix for a total acquisition time of 10.2 s, representing a three-fold reduction in acquisition time. The proposed iterative multiscale reconstruction reliably increases MRF acquisition speed and accuracy. Magn Reson Med 75:2481-2492, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  11. Longest Common Extensions via Fingerprinting

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li; Kristensen, Jesper

    2012-01-01

    query time, no extra space and no preprocessing achieves significantly better average case performance. We show a new algorithm, Fingerprint k , which for a parameter k, 1 ≤ k ≤ [log n], on a string of length n and alphabet size σ, gives O(k n1/k) query time using O(k n) space and O(k n + sort......(n,σ)) preprocessing time, where sort(n,σ) is the time it takes to sort n numbers from σ. Though this solution is asymptotically strictly worse than the asymptotically best previously known algorithms, it outperforms them in practice in average case and is almost as fast as the simple linear time algorithm. On worst....... The LCE problem can be solved in linear space with constant query time and a preprocessing of sorting complexity. There are two known approaches achieving these bounds, which use nearest common ancestors and range minimum queries, respectively. However, in practice a much simpler approach with linear...

  12. Social media fingerprints of unemployment.

    Science.gov (United States)

    Llorente, Alejandro; Garcia-Herranz, Manuel; Cebrian, Manuel; Moro, Esteban

    2015-01-01

    Recent widespread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and interpersonal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regions. We quantify the extent to which deviations in diurnal rhythm, mobility patterns, and communication styles across regions relate to their unemployment incidence. For this we examine a country-scale publicly articulated social media dataset, where we quantify individual behavioral features from over 19 million geo-located messages distributed among more than 340 different Spanish economic regions, inferred by computing communities of cohesive mobility fluxes. We find that regions exhibiting more diverse mobility fluxes, earlier diurnal rhythms, and more correct grammatical styles display lower unemployment rates. As a result, we provide a simple model able to produce accurate, easily interpretable reconstruction of regional unemployment incidence from their social-media digital fingerprints alone. Our results show that cost-effective economical indicators can be built based on publicly-available social media datasets.

  13. Social media fingerprints of unemployment.

    Directory of Open Access Journals (Sweden)

    Alejandro Llorente

    Full Text Available Recent widespread adoption of electronic and pervasive technologies has enabled the study of human behavior at an unprecedented level, uncovering universal patterns underlying human activity, mobility, and interpersonal communication. In the present work, we investigate whether deviations from these universal patterns may reveal information about the socio-economical status of geographical regions. We quantify the extent to which deviations in diurnal rhythm, mobility patterns, and communication styles across regions relate to their unemployment incidence. For this we examine a country-scale publicly articulated social media dataset, where we quantify individual behavioral features from over 19 million geo-located messages distributed among more than 340 different Spanish economic regions, inferred by computing communities of cohesive mobility fluxes. We find that regions exhibiting more diverse mobility fluxes, earlier diurnal rhythms, and more correct grammatical styles display lower unemployment rates. As a result, we provide a simple model able to produce accurate, easily interpretable reconstruction of regional unemployment incidence from their social-media digital fingerprints alone. Our results show that cost-effective economical indicators can be built based on publicly-available social media datasets.

  14. Electrical fingerprint of pipeline defects

    International Nuclear Information System (INIS)

    Mica, Isabella; Polignano, Maria Luisa; Marco, Cinzia De

    2004-01-01

    Pipeline defects are dislocations that connect the source region of the transistor with the drain region. They were widely reported to occur in CMOS, BiCMOS devices and recently in SOI technologies. They can reduce device yield either by affecting the devices functionality or by increasing the current consumption under stand-by conditions. In this work the electrical fingerprint of these dislocations is studied, its purpose is to enable us to identify these defects as the ones responsible for device failure. It is shown that the pipeline defects are responsible for a leakage current from source to drain in the transistors. This leakage has a resistive characteristic and it is lightly modulated by the body bias. It is not sensitive to temperature; vice versa the off-current of a good transistor exhibits the well-known exponential dependence on 1/T. The emission spectrum of these defects was studied and compared with the spectrum of a good transistor. The paper aims to show that the spectrum of a defective transistor is quite peculiar; it shows well defined peaks, whereas the spectrum of a good transistor under saturation conditions is characterized by a broad spectral light emission distribution. Finally the deep-level transient spectroscopy (DLTS) is tried on defective diodes

  15. DNA fingerprinting in botany: past, present, future.

    Science.gov (United States)

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-03

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67-73 and Nature 1985, 316:76-79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the novel method that allowed us for the first time to discriminate between humans, animals, plants and fungi on the individual level using DNA markers. A newsletter coined "Fingerprint News" was launched, T-shirts were sold, and the proceedings of the Berne conference filled a first book on "DNA fingerprinting: approaches and applications". Four more conferences were about to follow, one on each continent, and Alec Jeffreys of course was invited to all of them. Since these early days, methodologies have undergone a rapid evolution and diversification. A multitude of techniques have been developed, optimized, and eventually abandoned when novel and more efficient and/or more reliable methods appeared. Despite some overlap between the lifetimes of the different technologies, three phases can be defined that coincide with major technological advances. Whereas the first phase of DNA fingerprinting ("the past") was dominated by restriction fragment analysis in conjunction with Southern blot hybridization, the advent of the PCR in the late 1980s gave way to the development of PCR-based single- or multi-locus profiling techniques in the second phase. Given that many routine applications of plant DNA fingerprinting still rely on PCR-based markers, we here refer to these methods as "DNA fingerprinting in the present", and include numerous examples in the present review. The beginning of the third phase actually dates back to 2005, when several novel, highly parallel DNA sequencing

  16. Olfactory fingerprints for major histocompatibility complex-determined body odors.

    Science.gov (United States)

    Schaefer, M L; Young, D A; Restrepo, D

    2001-04-01

    Recognition of individual body odors is analogous to human face recognition in that it provides information about identity. Individual body odors determined by differences at the major histocompatibility complex (MHC or H-2) have been shown to influence mate choice, pregnancy block, and maternal behavior in mice. Unfortunately, the mechanism and extent of the main olfactory bulb (MOB) and accessory olfactory bulb (AOB) involvement in the discrimination of animals according to H-2-type has remained ambiguous. Here we study the neuronal activation patterns evoked in the MOB in different individuals on exposure to these complex, biologically meaningful sensory stimuli. We demonstrate that body odors from H-2 disparate mice evoke overlapping but distinct maps of neuronal activation in the MOB. The spatial patterns of odor-evoked activity are sufficient to be used like fingerprints to predict H-2 identity using a novel computer algorithm. These results provide functional evidence for discrimination of H-2-determined body odors in the MOB, but do not preclude a role for the AOB. These data further our understanding of the neural strategies used to decode socially relevant odors.

  17. Latent fingerprints on different type of screen protective films

    Directory of Open Access Journals (Sweden)

    Yuttana Sudjaroen

    2016-07-01

    Full Text Available The purpose of this research was to study the quality of latent fingerprint on different types of screen protective films including screen protector, matte screen protector, anti-fingerprint clear screen protector and anti-fingerprint matte screen protector by using black powder method in developing latent fingerprints. The fingerprints were performed by 10 volunteers whose fingers (right index, right thumb, left index and left thumb were stubbing at different types of screen protective films and subsequently latent fingerprints were developed by brushing with black powder. Automated Fingerprint Identification System (AFIS counted the numbers of minutiae points from 320 latent fingerprints. Anti-fingerprint matte screen protective film produced the best quality of latent fingerprint with an average minutiae point 72.65, followed by matte screen protective film, clear screen protective film and anti-fingerprint clear screen protective film with an average minutiae point of 155.2, 135.0 and 72.65 respectively. The quality of latent fingerprints developed between a clear and a matte surface of screen protective films showed a significant difference (sig>0.05, whereas the coat and the non-coat with anti-fingerprint chemical revealed a non-significant difference (sig<0.05 in their number of minutiae points.

  18. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  19. Near-Optimal Fingerprinting with Constraints

    Directory of Open Access Journals (Sweden)

    Gulyás Gábor György

    2016-10-01

    Full Text Available Several recent studies have demonstrated that people show large behavioural uniqueness. This has serious privacy implications as most individuals become increasingly re-identifiable in large datasets or can be tracked, while they are browsing the web, using only a couple of their attributes, called as their fingerprints. Often, the success of these attacks depends on explicit constraints on the number of attributes learnable about individuals, i.e., the size of their fingerprints. These constraints can be budget as well as technical constraints imposed by the data holder. For instance, Apple restricts the number of applications that can be called by another application on iOS in order to mitigate the potential privacy threats of leaking the list of installed applications on a device. In this work, we address the problem of identifying the attributes (e.g., smartphone applications that can serve as a fingerprint of users given constraints on the size of the fingerprint. We give the best fingerprinting algorithms in general, and evaluate their effectiveness on several real-world datasets. Our results show that current privacy guards limiting the number of attributes that can be queried about individuals is insufficient to mitigate their potential privacy risks in many practical cases.

  20. Efficient Filtering of Noisy Fingerprint Images

    Directory of Open Access Journals (Sweden)

    Maria Liliana Costin

    2016-01-01

    Full Text Available Fingerprint identification is an important field in the wide domain of biometrics with many applications, in different areas such: judicial, mobile phones, access systems, airports. There are many elaborated algorithms for fingerprint identification, but none of them can guarantee that the results of identification are always 100 % accurate. A first step in a fingerprint image analysing process consists in the pre-processing or filtering. If the result after this step is not by a good quality the upcoming identification process can fail. A major difficulty can appear in case of fingerprint identification if the images that should be identified from a fingerprint image database are noisy with different type of noise. The objectives of the paper are: the successful completion of the noisy digital image filtering, a novel more robust algorithm of identifying the best filtering algorithm and the classification and ranking of the images. The choice about the best filtered images of a set of 9 algorithms is made with a dual method of fuzzy and aggregation model. We are proposing through this paper a set of 9 filters with different novelty designed for processing the digital images using the following methods: quartiles, medians, average, thresholds and histogram equalization, applied all over the image or locally on small areas. Finally the statistics reveal the classification and ranking of the best algorithms.

  1. Speaker Recognition

    DEFF Research Database (Denmark)

    Mølgaard, Lasse Lohilahti; Jørgensen, Kasper Winther

    2005-01-01

    Speaker recognition is basically divided into speaker identification and speaker verification. Verification is the task of automatically determining if a person really is the person he or she claims to be. This technology can be used as a biometric feature for verifying the identity of a person...

  2. Individuality that is unheard of: systematic temporal deviations in scale playing leave an inaudible pianistic fingerprint

    Directory of Open Access Journals (Sweden)

    Floris Tijmen Van Vugt

    2013-03-01

    Full Text Available Whatever we do, we do it in our own way, and we recognise master artists by small samples of their work. This study investigates individuality of temporal deviations in musical scales in pianists in the absence of deliberate expressive intention. Note-by-note timing deviations away from regularity form a remarkably consistent "pianistic fingerprint". First, 8 professional pianists played C-major scales in two sessions, separated by fifteen minutes. Euclidian distances between deviation traces originating from different pianists were reliably larger than traces originating from the same pianist. As a result, a simple classifier that matched deviation traces by minimising their distance was able to recognise each pianist with 100% accuracy. Furthermore, within each pianist, fingerprints produced by the same movements were more similar than fingerprints resulting in the same scale sound. This allowed us to conclude that the fingerprints are mostly neuromuscular rather than intentional or expressive in nature. However, human listeners were not able to distinguish the temporal fingerprints by ear. Next, 18 pianists played C-major scales on a normal or muted piano. Recognition rates ranged from 83% to 100%, further supporting the view that auditory feedback is not implicated in the creation of the temporal signature. Finally, 20 pianists were recognised 20 months later at above-chance level, showing signature effects to be long lasting. Our results indicate that even non-expressive playing of scales reveals consistent, partially effector-unspecific, but inaudible inter-individual differences. We suggest that machine learning studies into individuality in performance will need to take into account unintentional but consistent variability below the perceptual threshold.

  3. Solving the Mystery of Fading Fingerprints with London Dispersion Forces.

    Science.gov (United States)

    Kimbrough, Doris R.; DeLorenzo, Ronald

    1998-01-01

    Focuses on the kidnapping of a child whose fingerprints were not found inside the crime vehicle. Discusses the investigation that followed and led to knowledge of the differences between the fingerprints of children and adults. (DDR)

  4. Fingerprinting Mobile Devices Using Personalized Configurations

    Directory of Open Access Journals (Sweden)

    Kurtz Andreas

    2016-01-01

    Full Text Available Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1 all fingerprints are unique and distinguishable; and (2 utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time

  5. Comparing Categorical and Probabilistic Fingerprint Evidence.

    Science.gov (United States)

    Garrett, Brandon; Mitchell, Gregory; Scurich, Nicholas

    2018-04-23

    Fingerprint examiners traditionally express conclusions in categorical terms, opining that impressions do or do not originate from the same source. Recently, probabilistic conclusions have been proposed, with examiners estimating the probability of a match between recovered and known prints. This study presented a nationally representative sample of jury-eligible adults with a hypothetical robbery case in which an examiner opined on the likelihood that a defendant's fingerprints matched latent fingerprints in categorical or probabilistic terms. We studied model language developed by the U.S. Defense Forensic Science Center to summarize results of statistical analysis of the similarity between prints. Participant ratings of the likelihood the defendant left prints at the crime scene and committed the crime were similar when exposed to categorical and strong probabilistic match evidence. Participants reduced these likelihoods when exposed to the weaker probabilistic evidence, but did not otherwise discriminate among the prints assigned different match probabilities. © 2018 American Academy of Forensic Sciences.

  6. Diversity of DNA fingerprints in Cryptococcus neoformans.

    Science.gov (United States)

    Varma, A; Swinne, D; Staib, F; Bennett, J E; Kwon-Chung, K J

    1995-07-01

    DNA fingerprint patterns of 156 Cryptococcus neoformans isolates (26 AIDS patients, 46 non-AIDS patients, and 40 environmental sources) from both varieties (126 C. neoformans var. neoformans and 30 C. neoformans var. gattii isolates) and from seven countries were analyzed by using the DNA probe UT-4p. Nine and twelve distinct DNA fingerprint patterns were observed for isolates of the C. neoformans var. neoformans and var. gattii, respectively. No pattern was unique to AIDS patients, non-AIDS patients, or the environment. Pattern II was observed more often in non-AIDS patients (8 of 23) than in AIDS patients (0 of 25). Pattern V was the most prevalent pattern (42 of 82) in clinical and environmental isolates. Isolates from three AIDS patients in Burundi and Zaire exhibited patterns identical to each other but different from those of isolates collected from their houses (i.e., dust of floors, walls, etc.) or a nearby pigeon coop. DNA fingerprint stability was determined for 53 isolates from nine non-AIDS patients at different time intervals during 5 to 128 weeks of antifungal therapy. For eight patients, the fingerprint pattern was stable while the ninth may have had a mixed infection. Pattern II was observed in 4 of 9 patients, which is similar to 4 of 14 in other non-AIDS patients as reported here. In spite of the extensive pattern heterogeneity among 15 C. neoformans var. gattii isolates in Australia, the patterns observed in seven California isolates were quite different from those in Australia. Among isolates of C. neoformans var. gattii, one fingerprint pattern (designated b) was observed in several countries of the Far East. The fingerprint patterns of two of three environmental isolates from Eucalyptus camaldulensis trees in Australia were identical to those of 2 of the 12 clinical isolates from the country.

  7. Fingerprint enhancement using a multispectral sensor

    Science.gov (United States)

    Rowe, Robert K.; Nixon, Kristin A.

    2005-03-01

    The level of performance of a biometric fingerprint sensor is critically dependent on the quality of the fingerprint images. One of the most common types of optical fingerprint sensors relies on the phenomenon of total internal reflectance (TIR) to generate an image. Under ideal conditions, a TIR fingerprint sensor can produce high-contrast fingerprint images with excellent feature definition. However, images produced by the same sensor under conditions that include dry skin, dirt on the skin, and marginal contact between the finger and the sensor, are likely to be severely degraded. This paper discusses the use of multispectral sensing as a means to collect additional images with new information about the fingerprint that can significantly augment the system performance under both normal and adverse sample conditions. In the context of this paper, "multispectral sensing" is used to broadly denote a collection of images taken under different illumination conditions: different polarizations, different illumination/detection configurations, as well as different wavelength illumination. Results from three small studies using an early-stage prototype of the multispectral-TIR (MTIR) sensor are presented along with results from the corresponding TIR data. The first experiment produced data from 9 people, 4 fingers from each person and 3 measurements per finger under "normal" conditions. The second experiment provided results from a study performed to test the relative performance of TIR and MTIR images when taken under extreme dry and dirty conditions. The third experiment examined the case where the area of contact between the finger and sensor is greatly reduced.

  8. FINGERPRINT DETECTION AND RECOGNIZATION TECHNIQUES USING GABOR FILTER

    OpenAIRE

    Yogita Verma*, Prof. Bhagwati Charan Patel

    2017-01-01

    Fingerprints are most extensively and effectively appropriate for the proof of identity in present days. Mostly because of their uniqueness among the people, public acceptance, originality, stability through life, and their least risk of invasion. Fingerprint technology, which is basically a biometric system, is utilized to identify an individual based on their physical qualities. Fingerprint matching is the trendiest biometric method appropriate to provide authentication. Fingerprint verific...

  9. Interoperability between Fingerprint Biometric Systems: An Empirical Study

    OpenAIRE

    Gashi, I.; Mason, S.; Lugini, L.; Marasco, E.; Cukic, B.

    2014-01-01

    Fingerprints are likely the most widely used biometric in commercial as well as law enforcement applications. With the expected rapid growth of fingerprint authentication in mobile devices their importance justifies increased demands for dependability. An increasing number of new sensors,applications and a diverse user population also intensify concerns about the interoperability in fingerprint authentication. In most applications, fingerprints captured for user enrollment with one device may...

  10. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  11. Fingerprint extraction from interference destruction terahertz spectrum.

    Science.gov (United States)

    Xiong, Wei; Shen, Jingling

    2010-10-11

    In this paper, periodic peaks in a terahertz absorption spectrum are confirmed to be induced from interference effects. Theoretically, we explained the periodic peaks and calculated the locations of them. Accordingly, a technique was suggested, with which the interference peaks in a terahertz spectrum can be eliminated and therefore a real terahertz absorption spectrum can be obtained. Experimentally, a sample, Methamphetamine, was investigated and its terahertz fingerprint was successfully extracted from its interference destruction spectrum. This technique is useful in getting samples' terahertz fingerprint spectra, and furthermore provides a fast nondestructive testing method using a large size terahertz beam to identify materials.

  12. Fingerprint image enhancement by differential hysteresis processing.

    Science.gov (United States)

    Blotta, Eduardo; Moler, Emilce

    2004-05-10

    A new method to enhance defective fingerprints images through image digital processing tools is presented in this work. When the fingerprints have been taken without any care, blurred and in some cases mostly illegible, as in the case presented here, their classification and comparison becomes nearly impossible. A combination of spatial domain filters, including a technique called differential hysteresis processing (DHP), is applied to improve these kind of images. This set of filtering methods proved to be satisfactory in a wide range of cases by uncovering hidden details that helped to identify persons. Dactyloscopy experts from Policia Federal Argentina and the EAAF have validated these results.

  13. A cancelable biometric scheme based on multi-lead ECGs.

    Science.gov (United States)

    Peng-Tzu Chen; Shun-Chi Wu; Jui-Hsuan Hsieh

    2017-07-01

    Biometric technologies offer great advantages over other recognition methods, but there are concerns that they may compromise the privacy of individuals. In this paper, an electrocardiogram (ECG)-based cancelable biometric scheme is proposed to relieve such concerns. In this scheme, distinct biometric templates for a given beat bundle are constructed via "subspace collapsing." To determine the identity of any unknown beat bundle, the multiple signal classification (MUSIC) algorithm, incorporating a "suppression and poll" strategy, is adopted. Unlike the existing cancelable biometric schemes, knowledge of the distortion transform is not required for recognition. Experiments with real ECGs from 285 subjects are presented to illustrate the efficacy of the proposed scheme. The best recognition rate of 97.58 % was achieved under the test condition N train = 10 and N test = 10.

  14. Image Processing and Features Extraction of Fingerprint Images ...

    African Journals Online (AJOL)

    To demonstrate the importance of the image processing of fingerprint images prior to image enrolment or comparison, the set of fingerprint images in databases (a) and (b) of the FVC (Fingerprint Verification Competition) 2000 database were analyzed using a features extraction algorithm. This paper presents the results of ...

  15. 8 CFR 1236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 1236.5... ORDERED REMOVED Detention of Aliens Prior to Order of Removal § 1236.5 Fingerprints and photographs. Every... photographed. Such fingerprints and photographs shall be made available to Federal, State, and local law...

  16. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  17. An investigation on the problem of thinning in fingerprint processing ...

    African Journals Online (AJOL)

    A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reli abi lity and thus require additional ...

  18. Chemical Fingerprinting of Materials Developed Due To Environmental Issues

    Science.gov (United States)

    Smith, Doris A.; McCool, A. (Technical Monitor)

    2000-01-01

    This paper presents viewgraphs on chemical fingerprinting of materials developed due to environmental issues. Some of the topics include: 1) Aerospace Materials; 2) Building Blocks of Capabilities; 3) Spectroscopic Techniques; 4) Chromatographic Techniques; 5) Factors that Determine Fingerprinting Approach; and 6) Fingerprinting: Combination of instrumental analysis methods that diagnostically characterize a material.

  19. Angstrom-Resolution Magnetic Resonance Imaging of Single Molecules via Wave-Function Fingerprints of Nuclear Spins

    Science.gov (United States)

    Ma, Wen-Long; Liu, Ren-Bao

    2016-08-01

    Single-molecule sensitivity of nuclear magnetic resonance (NMR) and angstrom resolution of magnetic resonance imaging (MRI) are the highest challenges in magnetic microscopy. Recent development in dynamical-decoupling- (DD) enhanced diamond quantum sensing has enabled single-nucleus NMR and nanoscale NMR. Similar to conventional NMR and MRI, current DD-based quantum sensing utilizes the "frequency fingerprints" of target nuclear spins. The frequency fingerprints by their nature cannot resolve different nuclear spins that have the same noise frequency or differentiate different types of correlations in nuclear-spin clusters, which limit the resolution of single-molecule MRI. Here we show that this limitation can be overcome by using "wave-function fingerprints" of target nuclear spins, which is much more sensitive than the frequency fingerprints to the weak hyperfine interaction between the targets and a sensor under resonant DD control. We demonstrate a scheme of angstrom-resolution MRI that is capable of counting and individually localizing single nuclear spins of the same frequency and characterizing the correlations in nuclear-spin clusters. A nitrogen-vacancy-center spin sensor near a diamond surface, provided that the coherence time is improved by surface engineering in the near future, may be employed to determine with angstrom resolution the positions and conformation of single molecules that are isotope labeled. The scheme in this work offers an approach to breaking the resolution limit set by the "frequency gradients" in conventional MRI and to reaching the angstrom-scale resolution.

  20. A Taxonomy for Radio Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Location Fingerprinting (LF) is a promising location technique for many awareness applications in pervasive computing. However, as research on LF systems goes beyond basic methods there is an increasing need for better comparison of proposed LF systems. Developers of LF systems are also lacking...

  1. Indoor Location Fingerprinting with Heterogeneous Clients

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2011-01-01

    Heterogeneous wireless clients measure signal strength differently. This is a fundamental problem for indoor location fingerprinting, and it has a high impact on the positioning accuracy. Mapping-based solutions have been presented that require manual and error-prone calibration for each new clie...

  2. Forensic use of fingermarks and fingerprints

    NARCIS (Netherlands)

    Meuwly, Didier; Li, Stan Z.; Jain, Anil K.

    2014-01-01

    The aim of this entry is to describe and explain the main forensic uses of fingermarks and fingerprints. It defines the concepts and provides the nomenclature related to forensic dactyloscopy. It describes the structure of the papillary ridges, the organization of the information in three levels,

  3. Genetic fingerprinting and phylogenetic diversity of Staphylococcus ...

    African Journals Online (AJOL)

    Genetic fingerprinting of 18 different isolates of Staphylococcus aureus from Nigeria using random amplified polymorphic DNA (RAPD) was carried out. Ten out of 100 Operon primers showed polymorphism among the isolates tested generating 88 bands, 51 of which were polymorphic with sizes ranging between 200 and ...

  4. Development of spectrophotometric fingerprinting method for ...

    African Journals Online (AJOL)

    Selective and efficient analytical methods are required not only for quality assurance but also for authentication of herbal formulations. A simple, rapid and validated fingerprint method has developed for estimation of piperine in 'Talisadi churna', a well known herbal formulation in India. The estimation was carried out in two ...

  5. Geochemical fingerprints and pebbles zircon geochronology

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Earth System Science; Volume 125; Issue 7. Geochemical fingerprints and pebbles zircon geochronology: Implications for the provenance and tectonic setting of Lower Cretaceous sediments in the Zhucheng Basin (Jiaodong peninsula, North China). Jin-Long Ni Jun-Lai Liu Xiao-Ling Tang ...

  6. Protein identification by peptide mass fingerprinting

    DEFF Research Database (Denmark)

    Hjernø, Karin

    2007-01-01

      Peptide mass fingerprinting is an effective way of identifying, e.g., gel-separated proteins, by matching experimentally obtained peptide mass data against large databases. However, several factors are known to influence the quality of the resulting matches, such as proteins contaminating the s...

  7. Indoor Localization Accuracy Estimation from Fingerprint Data

    DEFF Research Database (Denmark)

    Nikitin, Artyom; Laoudias, Christos; Chatzimilioudis, Georgios

    2017-01-01

    on arbitrary FMs coined ACCES. Our framework comprises a generic interpolation method using Gaussian Processes (GP), upon which a navigability score at any location is derived using the Cramer-Rao Lower Bound (CRLB). Our approach does not rely on the underlying physical model of the fingerprint data. Our...

  8. Peptide Mass Fingerprinting of Egg White Proteins

    Science.gov (United States)

    Alty, Lisa T.; LaRiviere, Frederick J.

    2016-01-01

    Use of advanced mass spectrometry techniques in the undergraduate setting has burgeoned in the past decade. However, relatively few undergraduate experiments examine the proteomics tools of protein digestion, peptide accurate mass determination, and database searching, also known as peptide mass fingerprinting. In this experiment, biochemistry…

  9. Collusion-resistant multimedia fingerprinting: a unified framework

    Science.gov (United States)

    Wu, Min; Trappe, Wade; Wang, Z. Jane; Liu, K. J. Ray

    2004-06-01

    Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an inteded recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each coluder, thus collusion poses a reeal challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.

  10. Fingerprint and Face Identification for Large User Population

    Directory of Open Access Journals (Sweden)

    Teddy Ko

    2003-06-01

    Full Text Available The main objective of this paper is to present the state-of-the-art of the current biometric (fingerprint and face technology, lessons learned during the investigative analysis performed to ascertain the benefits of using combined fingerprint and facial technologies, and recommendations for the use of current available fingerprint and face identification technologies for optimum identification performance for applications using large user population. Prior fingerprint and face identification test study results have shown that their identification accuracies are strongly dependent on the image quality of the biometric inputs. Recommended methodologies for ensuring the capture of acceptable quality fingerprint and facial images of subjects are also presented in this paper.

  11. Piezoelectric micromachined ultrasonic transducers for fingerprint sensing

    Science.gov (United States)

    Lu, Yipeng

    Fingerprint identification is the most prevalent biometric technology due to its uniqueness, universality and convenience. Over the past two decades, a variety of physical mechanisms have been exploited to capture an electronic image of a human fingerprint. Among these, capacitive fingerprint sensors are the ones most widely used in consumer electronics because they are fabricated using conventional complementary metal oxide semiconductor (CMOS) integrated circuit technology. However, capacitive fingerprint sensors are extremely sensitive to finger contamination and moisture. This thesis will introduce an ultrasonic fingerprint sensor using a PMUT array, which offers a potential solution to this problem. In addition, it has the potential to increase security, as it allows images to be collected at various depths beneath the epidermis, providing images of the sub-surface dermis layer and blood vessels. Firstly, PMUT sensitivity is maximized by optimizing the layer stack and electrode design, and the coupling coefficient is doubled via series transduction. Moreover, a broadband PMUT with 97% fractional bandwidth is achieved by utilizing a thinner structure excited at two adjacent mechanical vibration modes with overlapping bandwidth. In addition, we proposed waveguide PMUTs, which function to direct acoustic waves, confine acoustic energy, and provide mechanical protection for the PMUT array. Furthermore, PMUT arrays were fabricated with different processes to form the membrane, including front-side etching with a patterned sacrificial layer, front-side etching with additional anchor, cavity SOI wafers and eutectic bonding. Additionally, eutectic bonding allows the PMUT to be integrated with CMOS circuits. PMUTs were characterized in the mechanical, electrical and acoustic domains. Using transmit beamforming, a narrow acoustic beam was achieved, and high-resolution (sub-100 microm) and short-range (~1 mm) pulse-echo ultrasonic imaging was demonstrated using a steel

  12. Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting

    Directory of Open Access Journals (Sweden)

    Kai Dong

    2017-01-01

    Full Text Available The development of the Internet of Things has accelerated research in the indoor location fingerprinting technique, which provides value-added localization services for existing WLAN infrastructures without the need for any specialized hardware. The deployment of a fingerprinting based localization system requires an extremely large amount of measurements on received signal strength information to generate a location fingerprint database. Nonetheless, this requirement can rarely be satisfied in most indoor environments. In this paper, we target one but common situation when the collected measurements on received signal strength information are insufficient, and show limitations of existing location fingerprinting methods in dealing with inadequate location fingerprints. We also introduce a novel method to reduce noise in measuring the received signal strength based on the maximum likelihood estimation, and compute locations from inadequate location fingerprints by using the stochastic gradient descent algorithm. Our experiment results show that our proposed method can achieve better localization performance even when only a small quantity of RSS measurements is available. Especially when the number of observations at each location is small, our proposed method has evident superiority in localization accuracy.

  13. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  14. Uniqueness: skews bit occurrence frequencies in randomly generated fingerprint libraries.

    Science.gov (United States)

    Chen, Nelson G

    2016-08-01

    Requiring that randomly generated chemical fingerprint libraries have unique fingerprints such that no two fingerprints are identical causes a systematic skew in bit occurrence frequencies, the proportion at which specified bits are set. Observed frequencies (O) at which each bit is set within the resulting libraries systematically differ from frequencies at which bits are set at fingerprint generation (E). Observed frequencies systematically skew toward 0.5, with the effect being more pronounced as library size approaches the compound space, which is the total number of unique possible fingerprints given the number of bit positions each fingerprint contains. The effect is quantified for varying library sizes as a fraction of the overall compound space, and for changes in the specified frequency E. The cause and implications for this systematic skew are subsequently discussed. When generating random libraries of chemical fingerprints, the imposition of a uniqueness requirement should either be avoided or taken into account.

  15. Finite Boltzmann schemes

    NARCIS (Netherlands)

    Sman, van der R.G.M.

    2006-01-01

    In the special case of relaxation parameter = 1 lattice Boltzmann schemes for (convection) diffusion and fluid flow are equivalent to finite difference/volume (FD) schemes, and are thus coined finite Boltzmann (FB) schemes. We show that the equivalence is inherent to the homology of the

  16. Image Quality Enhancement Using the Direction and Thickness of Vein Lines for Finger-Vein Recognition

    OpenAIRE

    Park, Young Ho; Park, Kang Ryoung

    2012-01-01

    On the basis of the increased emphasis placed on the protection of privacy, biometric recognition systems using physical or behavioural characteristics such as fingerprints, facial characteristics, iris and finger‐vein patterns or the voice have been introduced in applications including door access control, personal certification, Internet banking and ATM machines. Among these, finger‐vein recognition is advantageous in that it involves the use of inexpensive and small devices that are diffic...

  17. Preventing Wine Counterfeiting by Individual Cork Stopper Recognition Using Image Processing Technologies

    Directory of Open Access Journals (Sweden)

    Valter Costa

    2018-03-01

    Full Text Available Wine counterfeiting is a major problem worldwide. Within this context, an approach to the problem of discerning original wine bottles from forged ones is the use of natural features present in the product, object and/or material (using it “as is”. The proposed application uses the cork stopper as a unique fingerprint, combined with state of the art image processing techniques to achieve individual object recognition and smartphones as the authentication equipment. The anti-counterfeiting scheme is divided into two phases: an enrollment phase, where every bottle is registered in a database using a photo of its cork stopper inside the bottle; and a verification phase, where an end-user/retailer captures a photo of the cork stopper using a regular smartphone, compares the photo with the previously-stored one and retrieves it if the wine bottle was previously registered. To evaluate the performance of the proposed application, two datasets of natural/agglomerate cork stoppers were built, totaling 1000 photos. The worst case results show a 100% precision ratio, an accuracy of 99.94% and a recall of 94.00%, using different smartphones. The perfect score in precision is a promising result, proving that this system can be applied to the prevention of wine counterfeiting and consumer/retailer security when purchasing a wine bottle.

  18. Maximum Likelihood Reconstruction for Magnetic Resonance Fingerprinting.

    Science.gov (United States)

    Zhao, Bo; Setsompop, Kawin; Ye, Huihui; Cauley, Stephen F; Wald, Lawrence L

    2016-08-01

    This paper introduces a statistical estimation framework for magnetic resonance (MR) fingerprinting, a recently proposed quantitative imaging paradigm. Within this framework, we present a maximum likelihood (ML) formalism to estimate multiple MR tissue parameter maps directly from highly undersampled, noisy k-space data. A novel algorithm, based on variable splitting, the alternating direction method of multipliers, and the variable projection method, is developed to solve the resulting optimization problem. Representative results from both simulations and in vivo experiments demonstrate that the proposed approach yields significantly improved accuracy in parameter estimation, compared to the conventional MR fingerprinting reconstruction. Moreover, the proposed framework provides new theoretical insights into the conventional approach. We show analytically that the conventional approach is an approximation to the ML reconstruction; more precisely, it is exactly equivalent to the first iteration of the proposed algorithm for the ML reconstruction, provided that a gridding reconstruction is used as an initialization.

  19. Reference Device-Assisted Adaptive Location Fingerprinting

    Directory of Open Access Journals (Sweden)

    Dongjin Wu

    2016-06-01

    Full Text Available Location fingerprinting suffers in dynamic environments and needs recalibration from time to time to maintain system performance. This paper proposes an adaptive approach for location fingerprinting. Based on real-time received signal strength indicator (RSSI samples measured by a group of reference devices, the approach applies a modified Universal Kriging (UK interpolant to estimate adaptive temporal and environmental radio maps. The modified UK can take the spatial distribution characteristics of RSSI into account. In addition, the issue of device heterogeneity caused by multiple reference devices is further addressed. To compensate the measuring differences of heterogeneous reference devices, differential RSSI metric is employed. Extensive experiments were conducted in an indoor field and the results demonstrate that the proposed approach not only adapts to dynamic environments and the situation of changing APs’ positions, but it is also robust toward measuring differences of heterogeneous reference devices.

  20. Regression-based Multi-View Facial Expression Recognition

    NARCIS (Netherlands)

    Rudovic, Ognjen; Patras, Ioannis; Pantic, Maja

    2010-01-01

    We present a regression-based scheme for multi-view facial expression recognition based on 2蚠D geometric features. We address the problem by mapping facial points (e.g. mouth corners) from non-frontal to frontal view where further recognition of the expressions can be performed using a

  1. Canonical, stable, general mapping using context schemes.

    Science.gov (United States)

    Novak, Adam M; Rosen, Yohei; Haussler, David; Paten, Benedict

    2015-11-15

    Sequence mapping is the cornerstone of modern genomics. However, most existing sequence mapping algorithms are insufficiently general. We introduce context schemes: a method that allows the unambiguous recognition of a reference base in a query sequence by testing the query for substrings from an algorithmically defined set. Context schemes only map when there is a unique best mapping, and define this criterion uniformly for all reference bases. Mappings under context schemes can also be made stable, so that extension of the query string (e.g. by increasing read length) will not alter the mapping of previously mapped positions. Context schemes are general in several senses. They natively support the detection of arbitrary complex, novel rearrangements relative to the reference. They can scale over orders of magnitude in query sequence length. Finally, they are trivially extensible to more complex reference structures, such as graphs, that incorporate additional variation. We demonstrate empirically the existence of high-performance context schemes, and present efficient context scheme mapping algorithms. The software test framework created for this study is available from https://registry.hub.docker.com/u/adamnovak/sequence-graphs/. anovak@soe.ucsc.edu Supplementary data are available at Bioinformatics online. © The Author 2015. Published by Oxford University Press. All rights reserved. For Permissions, please e-mail: journals.permissions@oup.com.

  2. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  3. SURVEY ON E-FINGERPRINT TICKET

    OpenAIRE

    Zakkam Solomon; Meghana K M; Manjula; Roshini B

    2017-01-01

    Earlier work has demonstrated that when going in a transport the installment accomplished for ticket is with money .The transport ticket has such an installment figure which makes the voyager or the conductor shy of cash as far as change. This makes the conductor to keep the change with himself .This makes bother to the explorers. Subsequently there is a requirement for better workplace. To conquer this issue we are making utilization of fingerprints of the voyager which are connected to the ...

  4. Analytical fingerprint for tantalum ores from African deposits

    Science.gov (United States)

    Melcher, F.; Graupner, T.; Sitnikova, M.; Oberthür, T.; Henjes-Kunst, F.; Gäbler, E.; Rantitsch, G.

    2009-04-01

    Kibaran age either show flat patterns for most tantalites, rising values from the LREE to the HREE, or trough-like patterns. Eu anomalies are strongly negative in columbite-tantalite from the Alto Ligonha Province in Mozambique, from the Namaqualand Province (Namibia, South Africa), and from Zimbabwe. Four main age populations of coltan deposits in Africa were revealed: (1) Archean (>2.5 Ga), (2) Paleoproterozoic (2.1-1.9 Ga), (3) early Neoproterozoic ("Kibaran", 1.0-0.9 Ga), and (4) late Neoproterozoic to early Paleozoic (Pan-African; ca. 0.6-0.4 Ga). Currently, we focus on the resolution of the fingerprinting system from region via ore province down to deposit scale, establishing a large and high-quality analytical data base, and developing fast-screening and low-cost methods. Analytical flow-charts and identification schemes for coltan ores will be presented at the Conference. The analytical results obtained so far indicate that a certification scheme including fingerprinting of sources of coltan ores is feasible. The methodology developed is capable to assist in the establishment of a control instrument in an envisaged certification of the production and trade chain of coltan.

  5. Fingerprint matching algorithm for poor quality images

    Directory of Open Access Journals (Sweden)

    Vedpal Singh

    2015-04-01

    Full Text Available The main aim of this study is to establish an efficient platform for fingerprint matching for low-quality images. Generally, fingerprint matching approaches use the minutiae points for authentication. However, it is not such a reliable authentication method for low-quality images. To overcome this problem, the current study proposes a fingerprint matching methodology based on normalised cross-correlation, which would improve the performance and reduce the miscalculations during authentication. It would decrease the computational complexities. The error rate of the proposed method is 5.4%, which is less than the two-dimensional (2D dynamic programming (DP error rate of 5.6%, while Lee's method produces 5.9% and the combined method has 6.1% error rate. Genuine accept rate at 1% false accept rate is 89.3% but at 0.1% value it is 96.7%, which is higher. The outcome of this study suggests that the proposed methodology has a low error rate with minimum computational effort as compared with existing methods such as Lee's method and 2D DP and the combined method.

  6. Scheme Program Documentation Tools

    DEFF Research Database (Denmark)

    Nørmark, Kurt

    2004-01-01

    are separate and intended for different documentation purposes they are related to each other in several ways. Both tools are based on XML languages for tool setup and for documentation authoring. In addition, both tools rely on the LAML framework which---in a systematic way---makes an XML language available...... as named functions in Scheme. Finally, the Scheme Elucidator is able to integrate SchemeDoc resources as part of an internal documentation resource....

  7. A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

    Directory of Open Access Journals (Sweden)

    V. Conti

    2009-01-01

    Full Text Available The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae and fingerprint macro features (singularity points for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys, are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.

  8. Enhancing security of fingerprints through contextual biometric watermarking.

    Science.gov (United States)

    Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M

    2007-07-04

    This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.

  9. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  10. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Saxifraga stolonifera Meerb.

    Directory of Open Access Journals (Sweden)

    Xing-Dong Wu

    2015-12-01

    Full Text Available This work investigated the spectrum-effect relationships between high performance liquid chromatography (HPLC fingerprints and the anti-benign prostatic hyperplasia activities of aqueous extracts from Saxifraga stolonifera. The fingerprints of S. stolonifera from various sources were established by HPLC and evaluated by similarity analysis (SA, hierarchical clustering analysis (HCA and principal component analysis (PCA. Nine samples were obtained from these 24 batches of different origins, according to the results of SA, HCA and the common chromatographic peaks area. A testosterone-induced mouse model of benign prostatic hyperplasia (BPH was used to establish the anti-benign prostatic hyperplasia activities of these nine S. stolonifera samples. The model was evaluated by analyzing prostatic index (PI, serum acid phosphatase (ACP activity, concentrations of serum dihydrotestosterone (DHT, prostatic acid phosphatase (PACP and type II 5α-reductase (SRD5A2. The spectrum-effect relationships between HPLC fingerprints and anti-benign prostatic hyperplasia activities were investigated using Grey Correlation Analysis (GRA and partial least squares regression (PLSR. The results showed that a close correlation existed between the fingerprints and anti-benign prostatic hyperplasia activities, and peak 14 (chlorogenic acid, peak 17 (quercetin 5-O-β-d-glucopyranoside and peak 18 (quercetin 3-O-β-l-rhamno-pyranoside in the HPLC fingerprints might be the main active components against anti-benign prostatic hyperplasia. This work provides a general model for the study of spectrum-effect relationships of S. stolonifera by combing HPLC fingerprints with a testosterone-induced mouse model of BPH, which can be employed to discover the principle components of anti-benign prostatic hyperplasia bioactivity.

  11. Vitality detection in personal authentication systems using fingerprints

    OpenAIRE

    Coli, Pietro

    2008-01-01

    Fingerprints are considered as the sign of each human being, and this has contributed the development of biometric applications based on such features. Since 2002, an important vulnerability has been shown: it is possible to deceive fingerprint scanners through artificial replicas of fingertips. In order to address this shortcoming it is need to recognize a spoofing attempt with artificial fingers looking for some “life signs” each time an user submit a fingerprint (vitality detection problem...

  12. Aspects of physicochemical methods for the detection of latent fingerprints

    International Nuclear Information System (INIS)

    Knowles, A.M.

    1978-01-01

    This paper reviews physicochemical methods of detecting latent finger-prints on a wide range of materials commonly found at the scene of a crime, with particular emphasis placed on the newer autoradiographic techniques. This is set against a description of studies on the fundamental nature of the latent fingerprint and its host substrate, with a brief review of the history of reagents used in latent fingerprint examination. (author)

  13. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  14. Fingerprints as a Proxy for Readership of Sales Flyers

    DEFF Research Database (Denmark)

    Schmidt, Marcus J.; Krause, Niels; Solgaard, Hans Stubbe

    2007-01-01

      Can readership of sales flyers and free newspapers be estimated by revealing fingerprints? In this paper we report the results of an empirical analysis based on 4604 flyer-pages conducted to assess the feasibility of the method. Results are encouraging, and indicate that the method presently may...... serve as a conservative estimate of readership. Advertising management may thus use the fingerprints-approach as an alternative audience measure and thereby assess the convergent validity of the traditional interview method and the fingerprint approach. While the fingerprint method appears valid...

  15. Study on Accuracy of Judgments by Chinese Fingerprint Examiners

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2015-01-01

    Full Text Available The interpretation of fingerprint evidence depends on the judgments of fingerprint examiners. This study assessed the accuracy of different judgments made by fingerprint examiners following the Analysis, Comparison, and Evaluation (ACE process. Each examiner was given five marks for analysis, comparison, and evaluation. We compared the experts′ judgments against the ground truth and used an annotation platform to evaluate how Chinese fingerprint examiners document their comparisons during the identification process. The results showed that different examiners demonstrated different accuracy of judgments and different mechanisms to reach them.

  16. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Science.gov (United States)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  17. Recovery of latent fingerprints and DNA on human skin.

    Science.gov (United States)

    Färber, Doris; Seul, Andrea; Weisser, Hans-Joachim; Bohnert, Michael

    2010-11-01

    The project "Latent Fingerprints and DNA on Human Skin" was the first systematic research in Europe dealing with detection of fingerprints and DNA left by offenders on the skin of corpses. One thousand samples gave results that allow general statements on the materials and methods used. The tests were carried out according to a uniform trial structure. Fingerprints were deposited by natural donors on corpses. The latent fingerprints were treated with magnetic powder or black fingerprint powder. Afterward, they were lifted with silicone casting material (Isomark(®)) or gelatine foil. All lifts were swabbed to recover DNA. It was possible to visualize comparable and identifiable fingerprints on the skin of corpses (16%). In the same categories, magnetic powder (18.4%) yielded better results than black fingerprint powder (13.6%). The number of comparable and identifiable fingerprints decreased on the lifts (12.7%). Isomark(®) (14.9%) was the better lifting material in comparison with gelatine foil (10.1%). In one-third of the samples, DNA could be extracted from the powdered and lifted latents. Black fingerprint powder delivered the better result with a rate of 2.2% for full DNA profiles and profiles useful for exclusion in comparison with 1.8% for the magnetic powder traces. Isomark(®) (3.1%) yielded better results than gelatine foil (0.6%). © 2010 American Academy of Forensic Sciences.

  18. Pattern Recognition

    Directory of Open Access Journals (Sweden)

    Aleš Procházka

    2018-05-01

    Full Text Available Multimodal signal analysis based on sophisticated sensors, efficient communicationsystems and fast parallel processing methods has a rapidly increasing range of multidisciplinaryapplications. The present paper is devoted to pattern recognition, machine learning, and the analysisof sleep stages in the detection of sleep disorders using polysomnography (PSG data, includingelectroencephalography (EEG, breathing (Flow, and electro-oculogram (EOG signals. The proposedmethod is based on the classification of selected features by a neural network system with sigmoidaland softmax transfer functions using Bayesian methods for the evaluation of the probabilities of theseparate classes. The application is devoted to the analysis of the sleep stages of 184 individualswith different diagnoses, using EEG and further PSG signals. Data analysis points to an averageincrease of the length of the Wake stage by 2.7% per 10 years and a decrease of the length of theRapid Eye Movement (REM stages by 0.8% per 10 years. The mean classification accuracy for givensets of records and single EEG and multimodal features is 88.7% ( standard deviation, STD: 2.1 and89.6% (STD:1.9, respectively. The proposed methods enable the use of adaptive learning processesfor the detection and classification of health disorders based on prior specialist experience andman–machine interaction.

  19. Multiresolution signal decomposition schemes

    NARCIS (Netherlands)

    J. Goutsias (John); H.J.A.M. Heijmans (Henk)

    1998-01-01

    textabstract[PNA-R9810] Interest in multiresolution techniques for signal processing and analysis is increasing steadily. An important instance of such a technique is the so-called pyramid decomposition scheme. This report proposes a general axiomatic pyramid decomposition scheme for signal analysis

  20. Adaptive protection scheme

    Directory of Open Access Journals (Sweden)

    R. Sitharthan

    2016-09-01

    Full Text Available This paper aims at modelling an electronically coupled distributed energy resource with an adaptive protection scheme. The electronically coupled distributed energy resource is a microgrid framework formed by coupling the renewable energy source electronically. Further, the proposed adaptive protection scheme provides a suitable protection to the microgrid for various fault conditions irrespective of the operating mode of the microgrid: namely, grid connected mode and islanded mode. The outstanding aspect of the developed adaptive protection scheme is that it monitors the microgrid and instantly updates relay fault current according to the variations that occur in the system. The proposed adaptive protection scheme also employs auto reclosures, through which the proposed adaptive protection scheme recovers faster from the fault and thereby increases the consistency of the microgrid. The effectiveness of the proposed adaptive protection is studied through the time domain simulations carried out in the PSCAD⧹EMTDC software environment.

  1. Assessing the varietal origin of extra-virgin olive oil using liquid chromatography fingerprints of phenolic compound, data fusion and chemometrics.

    Science.gov (United States)

    Bajoub, Aadil; Medina-Rodríguez, Santiago; Gómez-Romero, María; Ajal, El Amine; Bagur-González, María Gracia; Fernández-Gutiérrez, Alberto; Carrasco-Pancorbo, Alegría

    2017-01-15

    High Performance Liquid Chromatography (HPLC) with diode array (DAD) and fluorescence (FLD) detection was used to acquire the fingerprints of the phenolic fraction of monovarietal extra-virgin olive oils (extra-VOOs) collected over three consecutive crop seasons (2011/2012-2013/2014). The chromatographic fingerprints of 140 extra-VOO samples processed from olive fruits of seven olive varieties, were recorded and statistically treated for varietal authentication purposes. First, DAD and FLD chromatographic-fingerprint datasets were separately processed and, subsequently, were joined using "Low-level" and "Mid-Level" data fusion methods. After the preliminary examination by principal component analysis (PCA), three supervised pattern recognition techniques, Partial Least Squares Discriminant Analysis (PLS-DA), Soft Independent Modeling of Class Analogies (SIMCA) and K-Nearest Neighbors (k-NN) were applied to the four chromatographic-fingerprinting matrices. The classification models built were very sensitive and selective, showing considerably good recognition and prediction abilities. The combination "chromatographic dataset+chemometric technique" allowing the most accurate classification for each monovarietal extra-VOO was highlighted. Copyright © 2016 Elsevier Ltd. All rights reserved.

  2. Nanotag luminescent fingerprint anti-counterfeiting technology

    DEFF Research Database (Denmark)

    Radziwon, Michal Jędrzej; Rubahn, Horst-Günter; Johansen, Stefan

    2012-01-01

    We describe a method to fabricate, transfer and validate via image processing nanofibre- based, unique security marks (“nanotags”) for anti-counterfeiting purposes. Epitaxial surface growth of oligophenylenes on a heated muscovite mica crystal results in a thin film of mutually aligned nanofibres....... This fingerprint can be transferred on an adhesive tape as a label of a product, imaged using low magnification microscopy, digitalised and stored in a database. Infrared surface heating, enforced cooling and load lock transfer makes the fabrication process fast and scalable to mass production....

  3. The biometric recognition on contactless multi-spectrum finger images

    Science.gov (United States)

    Kang, Wenxiong; Chen, Xiaopeng; Wu, Qiuxia

    2015-01-01

    This paper presents a novel multimodal biometric system based on contactless multi-spectrum finger images, which aims to deal with the limitations of unimodal biometrics. The chief merits of the system are the richness of the permissible texture and the ease of data access. We constructed a multi-spectrum instrument to simultaneously acquire three different types of biometrics from a finger: contactless fingerprint, finger vein, and knuckleprint. On the basis of the samples with these characteristics, a moderate database was built for the evaluation of our system. Considering the real-time requirements and the respective characteristics of the three biometrics, the block local binary patterns algorithm was used to extract features and match for the fingerprints and finger veins, while the Oriented FAST and Rotated BRIEF algorithm was applied for knuckleprints. Finally, score-level fusion was performed on the matching results from the aforementioned three types of biometrics. The experiments showed that our proposed multimodal biometric recognition system achieves an equal error rate of 0.109%, which is 88.9%, 94.6%, and 89.7% lower than the individual fingerprint, knuckleprint, and finger vein recognitions, respectively. Nevertheless, our proposed system also satisfies the real-time requirements of the applications.

  4. Threshold Signature Schemes Application

    Directory of Open Access Journals (Sweden)

    Anastasiya Victorovna Beresneva

    2015-10-01

    Full Text Available This work is devoted to an investigation of threshold signature schemes. The systematization of the threshold signature schemes was done, cryptographic constructions based on interpolation Lagrange polynomial, elliptic curves and bilinear pairings were examined. Different methods of generation and verification of threshold signatures were explored, the availability of practical usage of threshold schemes in mobile agents, Internet banking and e-currency was shown. The topics of further investigation were given and it could reduce a level of counterfeit electronic documents signed by a group of users.

  5. 8 CFR 236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... photographs shall be made available to Federal, State, and local law enforcement agencies upon request to the...

  6. Teaching DNA Fingerprinting using a Hands-on Simulation.

    Science.gov (United States)

    Schug, Thatcher

    1998-01-01

    Presents an inexpensive hands-on lesson in DNA fingerprinting that can be completed in a single class period. Involves students in solving a murder in which a drop of blood is fingerprinted and matched with the blood of the murderer. (DDR)

  7. Distortion Estimation in Compressed Music Using Only Audio Fingerprints

    NARCIS (Netherlands)

    Doets, P.J.O.; Lagendijk, R.L.

    2008-01-01

    An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identification, even when the audio is severely distorted. Audio compression changes the fingerprint slightly. We show that these small

  8. Rotation-invariant fingerprint matching using radon and DCT

    Indian Academy of Sciences (India)

    Sangita Bharkad

    2017-11-20

    Nov 20, 2017 ... [6] Bazen A and Gerez S 2003 Fingerprint matching by thin- plate spline modeling of elastic deformations. Pattern. Recogn. 36(8): 1859–1867. [7] Jain A, Hong L and Bolle R 1997 On-line fingerprint veri- fication. IEEE Trans.

  9. DNA Fingerprinting Using PCR: A Practical Forensic Science Activity

    Science.gov (United States)

    Choi, Hyun-Jung; Ahn, Jung Hoon; Ko, Minsu

    2008-01-01

    This paper describes a forensic science simulation programme applicable for use in colleges. Students were asked to find a putative suspect by DNA fingerprinting using a simple protocol developed in this study. DNA samples were obtained from a hair root and a drop of blood, common sources of DNA in forensic science. The DNA fingerprinting protocol…

  10. dna and seed proteins fingerprinting of egyptian crop plants

    African Journals Online (AJOL)

    Dr. Haddad

    2012-11-01

    Nov 1, 2012 ... combinations were used for fingerprinting six cultivars which belongs to barley, rice and wheat cultivars leading to the production of numerous AFLP bands, 300 of them were polymorphic. Thirty SSR markers were obtained from fingerprinting eight cultivars belonging to the five studied species using 11.

  11. Friction ridge skin - Automated Fingerprint Identification System (AFIS)

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    This contribution describes the development and the forensic use of automated fingerprint identification systems (AFISs). AFISs were initially developed in order to overcome the limitations of the paper-based fingerprint collections, by digitizing the ten-print cards in computerized databases and to

  12. Utilizing AFIS searching tools to reduce errors in fingerprint casework.

    Science.gov (United States)

    Langenburg, Glenn; Hall, Carey; Rosemarie, Quincy

    2015-12-01

    Fifty-six (56) adjudicated, property crime cases involving fingerprint evidence were reviewed using a case-specific AFIS database tool. This tool allowed fingerprint experts to search latent prints in the cases against a database of friction ridge exemplars limited to only the individuals specific to that particular case. We utilized three different methods to encode and search the latent prints: automatic feature extraction, manual encoding performed by a student intern, and manual encoding performed by a fingerprint expert. Performance in the study was strongest when the encoding was conducted by the fingerprint expert. The results of the study showed that while the AFIS tools failed to locate all of the identifications originally reported by the initial fingerprint expert that worked the case, the AFIS tools helped to identify 7 additional latent prints that were not reported by the initial fingerprint expert. We conclude that this technology, when combined with fingerprint expertise, will reduce the number of instances where an erroneous exclusion could occur, increase the efficiency of a fingerprint unit, and be a useful tool for reviewing active or cold cases for missed opportunities to report identifications. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  13. Study of noninvasive detection of latent fingerprints using UV laser

    Science.gov (United States)

    Li, Hong-xia; Cao, Jing; Niu, Jie-qing; Huang, Yun-gang; Mao, Lin-jie; Chen, Jing-rong

    2011-06-01

    Latent fingerprints present a considerable challenge in forensics, and noninvasive procedure that captures a digital image of the latent fingerprints is significant in the field of criminal investigation. The capability of photography technologies using 266nm UV Nd:YAG solid state laser as excitation light source to provide detailed images of unprocessed latent fingerprints is demonstrated. Unprocessed latent fingerprints were developed on various non-absorbent and absorbing substrates. According to the special absorption, reflection, scattering and fluorescence characterization of the various residues in fingerprints (fatty acid ester, protein, and carbosylic acid salts etc) to the UV light to weaken or eliminate the background disturbance and increase the brightness contrast of fingerprints with the background, and using 266nm UV laser as excitation light source, fresh and old latent fingerprints on the surface of four types of non-absorbent objects as magazine cover, glass, back of cellphone, wood desktop paintwork and two types of absorbing objects as manila envelope, notebook paper were noninvasive detected and appeared through reflection photography and fluorescence photography technologies, and the results meet the fingerprint identification requirements in forensic science.

  14. Cell Identification based on Received Signal Strength Fingerprints: Concept and Application towards Energy Saving in Cellular Networks

    Directory of Open Access Journals (Sweden)

    Elke Roth-Mandutz

    2014-09-01

    Full Text Available The increasing deployment of small cells aimed at off-loading data traffic from macrocells in heterogeneous networks has resulted in a drastic increase in energy consumption in cellular networks. Energy consumption can be optimized in a selforganized way by adapting the number of active cells in response to the current traffic demand. In this paper we concentrate on the complex problem of how to identify small cells to be reactivated in situations where multiple cells are concurrently inactive. Solely based on the received signal strength, we present cell-specific patterns for the generation of unique cell fingerprints. The cell fingerprints of the deactivated cells are matched with measurements from a high data rate demanding mobile device to identify the most appropriate candidate. Our scheme results in a matching success rate of up to 100% to identify the best cell depending on the number of cells to be activated.

  15. A Survey of 2D Face Recognition Techniques

    Directory of Open Access Journals (Sweden)

    Mejda Chihaoui

    2016-09-01

    Full Text Available Despite the existence of various biometric techniques, like fingerprints, iris scan, as well as hand geometry, the most efficient and more widely-used one is face recognition. This is because it is inexpensive, non-intrusive and natural. Therefore, researchers have developed dozens of face recognition techniques over the last few years. These techniques can generally be divided into three categories, based on the face data processing methodology. There are methods that use the entire face as input data for the proposed recognition system, methods that do not consider the whole face, but only some features or areas of the face and methods that use global and local face characteristics simultaneously. In this paper, we present an overview of some well-known methods in each of these categories. First, we expose the benefits of, as well as the challenges to the use of face recognition as a biometric tool. Then, we present a detailed survey of the well-known methods by expressing each method’s principle. After that, a comparison between the three categories of face recognition techniques is provided. Furthermore, the databases used in face recognition are mentioned, and some results of the applications of these methods on face recognition databases are presented. Finally, we highlight some new promising research directions that have recently appeared.

  16. CSR schemes in agribusiness

    DEFF Research Database (Denmark)

    Pötz, Katharina Anna; Haas, Rainer; Balzarova, Michaela

    2013-01-01

    of schemes that can be categorized on focus areas, scales, mechanisms, origins, types and commitment levels. Research limitations/implications – The findings contribute to conceptual and empirical research on existing models to compare and analyse CSR standards. Sampling technique and depth of analysis limit......Purpose – The rise of CSR followed a demand for CSR standards and guidelines. In a sector already characterized by a large number of standards, the authors seek to ask what CSR schemes apply to agribusiness, and how they can be systematically compared and analysed. Design....../methodology/approach – Following a deductive-inductive approach the authors develop a model to compare and analyse CSR schemes based on existing studies and on coding qualitative data on 216 CSR schemes. Findings – The authors confirm that CSR standards and guidelines have entered agribusiness and identify a complex landscape...

  17. Tabled Execution in Scheme

    Energy Technology Data Exchange (ETDEWEB)

    Willcock, J J; Lumsdaine, A; Quinlan, D J

    2008-08-19

    Tabled execution is a generalization of memorization developed by the logic programming community. It not only saves results from tabled predicates, but also stores the set of currently active calls to them; tabled execution can thus provide meaningful semantics for programs that seemingly contain infinite recursions with the same arguments. In logic programming, tabled execution is used for many purposes, both for improving the efficiency of programs, and making tasks simpler and more direct to express than with normal logic programs. However, tabled execution is only infrequently applied in mainstream functional languages such as Scheme. We demonstrate an elegant implementation of tabled execution in Scheme, using a mix of continuation-passing style and mutable data. We also show the use of tabled execution in Scheme for a problem in formal language and automata theory, demonstrating that tabled execution can be a valuable tool for Scheme users.

  18. [HPLC characteristic fingerprints of sedi linearis herba and sedi herba].

    Science.gov (United States)

    Lu, Lan-Qing; Mei, Qing; Wan, Ding-Rong; Yang, Xin-Zhou; Qiao, Shu; Zhao, Yu-Dan

    2014-04-01

    To study HPLC characteristic fingerprint of Sedum lineare from different harvest periods, and to compare with its related species Sedum sarmentosum. The HPLC fingerprints of Sedum lineare from different collecting periods were established and compared with Sedum sarmentosum by the same detection method. Hyperin, isoquercitrin and astragaloside were identified from the HPLC fingerprint of Sedum lineare. The fingerprint of Sedum lineare growing in the same area but different environment were basically identical; while there were remarkable differences of Sedum lineare growing in the same place but from different harvest periods, with the area of most common peaks changing from little to great, and slightly different peak number. The HPLC fingerprint of the two Sedum species had four common peaks, but could be distinguished from each other. The optimal harvest period of these two species should be full-bloom stage. The established method can provide reference for identification and quality analysis of Sedum lineare.

  19. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Directory of Open Access Journals (Sweden)

    Chia-Nan Wang

    2017-10-01

    Full Text Available Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  20. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Science.gov (United States)

    Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-01-01

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs. PMID:29065556

  1. Identification and Quality Assessment of Chrysanthemum Buds by CE Fingerprinting

    Directory of Open Access Journals (Sweden)

    Xiaoping Xing

    2015-01-01

    Full Text Available A simple and efficient fingerprinting method for chrysanthemum buds was developed with the aim of establishing a quality control protocol based on biochemical makeup. Chrysanthemum bud samples were successively extracted by water and alcohol. The fingerprints of the chrysanthemum buds samples were obtained using capillary electrophoresis and electrochemical detection (CE-ED employing copper and carbon working electrodes to capture all of the chemical information. 10 batches of chrysanthemum buds were collected from different regions and various factories to establish the baseline fingerprint. The experimental data of 10 batches electropherogram buds by CE were analyzed by correlation coefficient and the included angle cosine methods. A standard chrysanthemum bud fingerprint including 24 common peaks was established, 12 from each electrode, which was successfully applied to identify and distinguish between chrysanthemum buds from 2 other chrysanthemum species. These results demonstrate that fingerprint analysis can be used as an important criterion for chrysanthemum buds quality control.

  2. [Studies on fingerprinting of Flos Buddleja by RP-HPLC].

    Science.gov (United States)

    Han, Peng; Cui, Ya-jun; Guo, Hong-zhu; Guo, De-an

    2004-10-01

    To establish fingerprinting of Flos Buddleja by using RP-HPLC for the quality control. The HPLC condition was as follows: Inertsil ODS-3 C18 analytical column (4.6 mm x 250 mm, 5 microm), gredient eluation with MeCN (0.1% TFA)-H2O (0.1%TFA), flow rate 1.0 mL x min(-1), detection wavelength 254 nm. 10 commercial samples were analyzed to establish a fingerprinting. Among the obtained fingerprinting, most of the detected peaks were separated effectively. The accuracy, repeatability and stability of this method were satisfied. The RSDs of relative retention time and area of aimed peaks which existed in all samples wereless than 5%. Theresults were in accordance with the request of fingerprinting. The established fingerprinting can be used for the quality control of Flos Buddleja.

  3. Optical Methods in Fingerprint Imaging for Medical and Personality Applications.

    Science.gov (United States)

    Wang, Chia-Nan; Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-10-23

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the "Big Five" personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  4. Evaluating statistical cloud schemes

    OpenAIRE

    Grützun, Verena; Quaas, Johannes; Morcrette , Cyril J.; Ament, Felix

    2015-01-01

    Statistical cloud schemes with prognostic probability distribution functions have become more important in atmospheric modeling, especially since they are in principle scale adaptive and capture cloud physics in more detail. While in theory the schemes have a great potential, their accuracy is still questionable. High-resolution three-dimensional observational data of water vapor and cloud water, which could be used for testing them, are missing. We explore the potential of ground-based re...

  5. Gamma spectrometry; level schemes

    International Nuclear Information System (INIS)

    Blachot, J.; Bocquet, J.P.; Monnand, E.; Schussler, F.

    1977-01-01

    The research presented dealt with: a new beta emitter, isomer of 131 Sn; the 136 I levels fed through the radioactive decay of 136 Te (20.9s); the A=145 chain (β decay of Ba, La and Ce, and level schemes for 145 La, 145 Ce, 145 Pr); the A=47 chain (La and Ce, β decay, and the level schemes of 147 Ce and 147 Pr) [fr

  6. Scheme of energy utilities

    International Nuclear Information System (INIS)

    2002-04-01

    This scheme defines the objectives relative to the renewable energies and the rational use of the energy in the framework of the national energy policy. It evaluates the needs and the potentialities of the regions and preconizes the actions between the government and the territorial organizations. The document is presented in four parts: the situation, the stakes and forecasts; the possible actions for new measures; the scheme management and the regional contributions analysis. (A.L.B.)

  7. MR fingerprinting reconstruction with Kalman filter.

    Science.gov (United States)

    Zhang, Xiaodi; Zhou, Zechen; Chen, Shiyang; Chen, Shuo; Li, Rui; Hu, Xiaoping

    2017-09-01

    Magnetic resonance fingerprinting (MR fingerprinting or MRF) is a newly introduced quantitative magnetic resonance imaging technique, which enables simultaneous multi-parameter mapping in a single acquisition with improved time efficiency. The current MRF reconstruction method is based on dictionary matching, which may be limited by the discrete and finite nature of the dictionary and the computational cost associated with dictionary construction, storage and matching. In this paper, we describe a reconstruction method based on Kalman filter for MRF, which avoids the use of dictionary to obtain continuous MR parameter measurements. With this Kalman filter framework, the Bloch equation of inversion-recovery balanced steady state free-precession (IR-bSSFP) MRF sequence was derived to predict signal evolution, and acquired signal was entered to update the prediction. The algorithm can gradually estimate the accurate MR parameters during the recursive calculation. Single pixel and numeric brain phantom simulation were implemented with Kalman filter and the results were compared with those from dictionary matching reconstruction algorithm to demonstrate the feasibility and assess the performance of Kalman filter algorithm. The results demonstrated that Kalman filter algorithm is applicable for MRF reconstruction, eliminating the need for a pre-define dictionary and obtaining continuous MR parameter in contrast to the dictionary matching algorithm. Copyright © 2017 Elsevier Inc. All rights reserved.

  8. A Framework for Reproducible Latent Fingerprint Enhancements.

    Science.gov (United States)

    Carasso, Alfred S

    2014-01-01

    Photoshop processing of latent fingerprints is the preferred methodology among law enforcement forensic experts, but that appproach is not fully reproducible and may lead to questionable enhancements. Alternative, independent, fully reproducible enhancements, using IDL Histogram Equalization and IDL Adaptive Histogram Equalization, can produce better-defined ridge structures, along with considerable background information. Applying a systematic slow motion smoothing procedure to such IDL enhancements, based on the rapid FFT solution of a Lévy stable fractional diffusion equation, can attenuate background detail while preserving ridge information. The resulting smoothed latent print enhancements are comparable to, but distinct from, forensic Photoshop images suitable for input into automated fingerprint identification systems, (AFIS). In addition, this progressive smoothing procedure can be reexamined by displaying the suite of progressively smoother IDL images. That suite can be stored, providing an audit trail that allows monitoring for possible loss of useful information, in transit to the user-selected optimal image. Such independent and fully reproducible enhancements provide a valuable frame of reference that may be helpful in informing, complementing, and possibly validating the forensic Photoshop methodology.

  9. Secure Biometric E-Voting Scheme

    Science.gov (United States)

    Ahmed, Taha Kh.; Aborizka, Mohamed

    The implementation of the e-voting becomes more substantial with the rapid increase of e-government development. The recent growth in communications and cryptographic techniques facilitate the implementation of e-voting. Many countries introduced e-voting systems; unfortunately most of these systems are not fully functional. In this paper we will present an e-voting scheme that covers most of the e-voting requirements, smart card and biometric recognition technology were implemented to guarantee voter's privacy and authentication.

  10. Real time biometric surveillance with gait recognition

    Science.gov (United States)

    Mohapatra, Subasish; Swain, Anisha; Das, Manaswini; Mohanty, Subhadarshini

    2018-04-01

    Bio metric surveillance has become indispensable for every system in the recent years. The contribution of bio metric authentication, identification, and screening purposes are widely used in various domains for preventing unauthorized access. A large amount of data needs to be updated, segregated and safeguarded from malicious software and misuse. Bio metrics is the intrinsic characteristics of each individual. Recently fingerprints, iris, passwords, unique keys, and cards are commonly used for authentication purposes. These methods have various issues related to security and confidentiality. These systems are not yet automated to provide the safety and security. The gait recognition system is the alternative for overcoming the drawbacks of the recent bio metric based authentication systems. Gait recognition is newer as it hasn't been implemented in the real-world scenario so far. This is an un-intrusive system that requires no knowledge or co-operation of the subject. Gait is a unique behavioral characteristic of every human being which is hard to imitate. The walking style of an individual teamed with the orientation of joints in the skeletal structure and inclinations between them imparts the unique characteristic. A person can alter one's own external appearance but not skeletal structure. These are real-time, automatic systems that can even process low-resolution images and video frames. In this paper, we have proposed a gait recognition system and compared the performance with conventional bio metric identification systems.

  11. Estimation of perfusion properties with MR Fingerprinting Arterial Spin Labeling.

    Science.gov (United States)

    Wright, Katherine L; Jiang, Yun; Ma, Dan; Noll, Douglas C; Griswold, Mark A; Gulani, Vikas; Hernandez-Garcia, Luis

    2018-03-12

    In this study, the acquisition of ASL data and quantification of multiple hemodynamic parameters was explored using a Magnetic Resonance Fingerprinting (MRF) approach. A pseudo-continuous ASL labeling scheme was used with pseudo-randomized timings to acquire the MRF ASL data in a 2.5 min acquisition. A large dictionary of MRF ASL signals was generated by combining a wide range of physical and hemodynamic properties with the pseudo-random MRF ASL sequence and a two-compartment model. The acquired signals were matched to the dictionary to provide simultaneous quantification of cerebral blood flow, tissue time-to-peak, cerebral blood volume, arterial time-to-peak, B 1 , and T 1. A study in seven healthy volunteers resulted in the following values across the population in grey matter (mean ± standard deviation): cerebral blood flow of 69.1 ± 6.1 ml/min/100 g, arterial time-to-peak of 1.5 ± 0.1 s, tissue time-to-peak of 1.5 ± 0.1 s, T 1 of 1634 ms, cerebral blood volume of 0.0048 ± 0.0005. The CBF measurements were compared to standard pCASL CBF estimates using a one-compartment model, and a Bland-Altman analysis showed good agreement with a minor bias. Repeatability was tested in five volunteers in the same exam session, and no statistical difference was seen. In addition to this validation, the MRF ASL acquisition's sensitivity to the physical and physiological parameters of interest was studied numerically. Copyright © 2018 Elsevier Inc. All rights reserved.

  12. Metabolic fingerprint of Gestational Diabetes Mellitus.

    Science.gov (United States)

    Dudzik, Danuta; Zorawski, Marcin; Skotnicki, Mariusz; Zarzycki, Wieslaw; Kozlowska, Gabryela; Bibik-Malinowska, Katarzyna; Vallejo, María; García, Antonia; Barbas, Coral; Ramos, M Pilar

    2014-05-30

    Gestational Diabetes (GDM) is causing severe short- and long-term complications for mother, fetus or neonate. As yet, the metabolic alterations that are specific for the development of GDM have not been fully determined, which also precludes the early diagnosis and prognosis of this pathology. In this pilot study, we determine the metabolic fingerprint, using a multiplatform LC-QTOF/MS, GC-Q/MS and CE-TOF/MS system, of plasma and urine samples of 20 women with GDM and 20 with normal glucose tolerance in the second trimester of pregnancy. Plasma fingerprints allowed for the discrimination of GDM pregnant women from controls. In particular, lysoglycerophospholipids showed a close association with the glycemic state of the women. In addition, we identified some metabolites with a strong discriminative power, such as LPE(20:1), (20:2), (22:4); LPC(18:2), (20:4), (20:5); LPI(18:2), (20:4); LPS(20:0) and LPA(18:2), as well as taurine-bile acids and long-chain polyunsaturated fatty acid derivatives. Finally, we provide evidence for the implication of these compounds in metabolic routes, indicative of low-grade inflammation and altered redox-balance, that may be related with the specific pathophysiological context of the genesis of GDM. This highlights their potential use as prognostic markers for the identification of women at risk to develop severe glucose intolerance during pregnancy. Gestational Diabetes Mellitus (GDM) is increasing worldwide and, although diabetes usually remits after pregnancy, women with GDM have a high risk of developing postpartum type 2-diabetes, particularly when accompanied by obesity. Therefore, understanding the pathophysiology of GDM, as well as the identification of potentially modifiable risk factors and early diagnostic markers for GDM are relevant issues. In the present study, we devised a multiplatform metabolic fingerprinting approach to obtain a comprehensive picture of the early metabolic alternations that occur in GDM, and may

  13. An Investigation on the Problem of Thinning in Fingerprint Processing

    Directory of Open Access Journals (Sweden)

    I. O. Omeiza

    2012-06-01

    Full Text Available A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reliability and thus require additional minutiae-pruning stage to discard the erroneous minutiae in the obtained skeletons. The work involves a careful blending of some already existing algorithms to achieve optimal performance in thinning binarised fingerprint images. The algorithms considered are as follows. The "Zhang and Suen" parallel algorithm for thinning digital patterns, the improved parallel thinning algorithm by Holt and company and template-based thinning algorithm by Stentiford and Mortimer. The idea of combining these stand-alone algorithms to improve the quality of obtained objects skeleton in general image processing was first suggested in a text by Parker in 1998. However, his work does not specifically address the fingerprint problem. This work has examined and proves the plausibility of this thinning approach in the particular case of fingerprint application domain. The thinning procedure obtained satisfactory skeletons for fingerprint applications.

  14. Missing data reconstruction using Gaussian mixture models for fingerprint images

    Science.gov (United States)

    Agaian, Sos S.; Yeole, Rushikesh D.; Rao, Shishir P.; Mulawka, Marzena; Troy, Mike; Reinecke, Gary

    2016-05-01

    Publisher's Note: This paper, originally published on 25 May 2016, was replaced with a revised version on 16 June 2016. If you downloaded the original PDF, but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. One of the most important areas in biometrics is matching partial fingerprints in fingerprint databases. Recently, significant progress has been made in designing fingerprint identification systems for missing fingerprint information. However, a dependable reconstruction of fingerprint images still remains challenging due to the complexity and the ill-posed nature of the problem. In this article, both binary and gray-level images are reconstructed. This paper also presents a new similarity score to evaluate the performance of the reconstructed binary image. The offered fingerprint image identification system can be automated and extended to numerous other security applications such as postmortem fingerprints, forensic science, investigations, artificial intelligence, robotics, all-access control, and financial security, as well as for the verification of firearm purchasers, driver license applicants, etc.

  15. Detection and analysis of diamond fingerprinting feature and its application

    Energy Technology Data Exchange (ETDEWEB)

    Li Xin; Huang Guoliang; Li Qiang; Chen Shengyi, E-mail: tshgl@tsinghua.edu.cn [Department of Biomedical Engineering, the School of Medicine, Tsinghua University, Beijing, 100084 (China)

    2011-01-01

    Before becoming a jewelry diamonds need to be carved artistically with some special geometric features as the structure of the polyhedron. There are subtle differences in the structure of this polyhedron in each diamond. With the spatial frequency spectrum analysis of diamond surface structure, we can obtain the diamond fingerprint information which represents the 'Diamond ID' and has good specificity. Based on the optical Fourier Transform spatial spectrum analysis, the fingerprinting identification of surface structure of diamond in spatial frequency domain was studied in this paper. We constructed both the completely coherent diamond fingerprinting detection system illuminated by laser and the partially coherent diamond fingerprinting detection system illuminated by led, and analyzed the effect of the coherence of light source to the diamond fingerprinting feature. We studied rotation invariance and translation invariance of the diamond fingerprinting and verified the feasibility of real-time and accurate identification of diamond fingerprint. With the profit of this work, we can provide customs, jewelers and consumers with a real-time and reliable diamonds identification instrument, which will curb diamond smuggling, theft and other crimes, and ensure the healthy development of the diamond industry.

  16. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Polygoni Perfoliati Herba

    Directory of Open Access Journals (Sweden)

    Li Tian

    2013-01-01

    Full Text Available Polygoni Perfoliati Herba is widely used in China with antibacterium, anti-inflammatory, expectorant, antitumor, and antivirus activities. To reveal the mechanisms of the activities of Polygoni Perfoliati Herba, the relationship between the fingerprinting profile and its bioactivities was investigated. In the present study, high-performance liquid chromatographic (HPLC fingerprinting method was developed. The established method was applied to analyze 51 batches of Polygoni Perfoliati Herba samples collected from different locations or in different harvesting times in China. Chemometrics, including similarity analysis, hierarchical clustering analysis, and principal component analysis, were used to express their similarities. It was found that similarity values of the samples were in the range of 0.432–0.998. The results of analgesic tests indicated that Polygoni Perfoliati Herba could significantly inhibit pain induced by hot plate and acetic acid in mice. The results of anti-inflammatory tests showed that Polygoni Perfoliati Herba had good anti-inflammatory effects (P < 0.01 in two models including dimethyl benzene-induced ear edema and acetic acid-induced peritoneal permeability in mice. Combining the results from chromatographic fingerprints with those from bioactivities, we found that seven peaks from Polygoni Perfoliati Herba were mainly responsible for analgesic and anti-inflammatory activities.

  17. The Ins and Outs of DNA Fingerprinting the Infectious Fungi

    Science.gov (United States)

    Soll, David R.

    2000-01-01

    DNA fingerprinting methods have evolved as major tools in fungal epidemiology. However, no single method has emerged as the method of choice, and some methods perform better than others at different levels of resolution. In this review, requirements for an effective DNA fingerprinting method are proposed and procedures are described for testing the efficacy of a method. In light of the proposed requirements, the most common methods now being used to DNA fingerprint the infectious fungi are described and assessed. These methods include restriction fragment length polymorphisms (RFLP), RFLP with hybridization probes, randomly amplified polymorphic DNA and other PCR-based methods, electrophoretic karyotyping, and sequencing-based methods. Procedures for computing similarity coefficients, generating phylogenetic trees, and testing the stability of clusters are then described. To facilitate the analysis of DNA fingerprinting data, computer-assisted methods are described. Finally, the problems inherent in the collection of test and control isolates are considered, and DNA fingerprinting studies of strain maintenance during persistent or recurrent infections, microevolution in infecting strains, and the origin of nosocomial infections are assessed in light of the preceding discussion of the ins and outs of DNA fingerprinting. The intent of this review is to generate an awareness of the need to verify the efficacy of each DNA fingerprinting method for the level of genetic relatedness necessary to answer the epidemiological question posed, to use quantitative methods to analyze DNA fingerprint data, to use computer-assisted DNA fingerprint analysis systems to analyze data, and to file data in a form that can be used in the future for retrospective and comparative studies. PMID:10756003

  18. Towards Symbolic Encryption Schemes

    DEFF Research Database (Denmark)

    Ahmed, Naveed; Jensen, Christian D.; Zenner, Erik

    2012-01-01

    , namely an authenticated encryption scheme that is secure under chosen ciphertext attack. Therefore, many reasonable encryption schemes, such as AES in the CBC or CFB mode, are not among the implementation options. In this paper, we report new attacks on CBC and CFB based implementations of the well......Symbolic encryption, in the style of Dolev-Yao models, is ubiquitous in formal security models. In its common use, encryption on a whole message is specified as a single monolithic block. From a cryptographic perspective, however, this may require a resource-intensive cryptographic algorithm......-known Needham-Schroeder and Denning-Sacco protocols. To avoid such problems, we advocate the use of refined notions of symbolic encryption that have natural correspondence to standard cryptographic encryption schemes....

  19. Compact Spreader Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Placidi, M.; Jung, J. -Y.; Ratti, A.; Sun, C.

    2014-07-25

    This paper describes beam distribution schemes adopting a novel implementation based on low amplitude vertical deflections combined with horizontal ones generated by Lambertson-type septum magnets. This scheme offers substantial compactness in the longitudinal layouts of the beam lines and increased flexibility for beam delivery of multiple beam lines on a shot-to-shot basis. Fast kickers (FK) or transverse electric field RF Deflectors (RFD) provide the low amplitude deflections. Initially proposed at the Stanford Linear Accelerator Center (SLAC) as tools for beam diagnostics and more recently adopted for multiline beam pattern schemes, RFDs offer repetition capabilities and a likely better amplitude reproducibility when compared to FKs, which, in turn, offer more modest financial involvements both in construction and operation. Both solutions represent an ideal approach for the design of compact beam distribution systems resulting in space and cost savings while preserving flexibility and beam quality.

  20. Disease state fingerprint for fall risk assessment.

    Science.gov (United States)

    Similä, Heidi; Immonen, Milla

    2014-01-01

    Fall prevention is an important and complex multifactorial challenge, since one third of people over 65 years old fall at least once every year. A novel application of Disease State Fingerprint (DSF) algorithm is presented for holistic visualization of fall risk factors and identifying persons with falls history or decreased level of physical functioning based on fall risk assessment data. The algorithm is tested with data from 42 older adults, that went through a comprehensive fall risk assessment. Within the study population the Activities-specific Balance Confidence (ABC) scale score, Berg Balance Scale (BBS) score and the number of drugs in use were the three most relevant variables, that differed between the fallers and non-fallers. This study showed that the DSF visualization is beneficial in inspection of an individual's significant fall risk factors, since people have problems in different areas and one single assessment scale is not enough to expose all the people at risk.

  1. Ferroelastic Fingerprints in Methylammonium Lead Iodide Perovskite

    KAUST Repository

    Hermes, Ilka M.

    2016-02-12

    Methylammonium lead iodide (MAPbI3) perovskite materials show an outstanding performance in photovoltaic devices. However, certain material properties, especially the possible ferroic behavior, remain unclear. We observed distinct nanoscale periodic domains in the piezoresponse of MAPbI3(Cl) grains. The structure and the orientation of these striped domains indicate ferroelasticity as their origin. By correlating vertical and lateral piezoresponse force microscopy experiments performed at different sample orientations with x-ray diffraction, the preferred domain orientation was suggested to be the a1-a2-phase. The observation of these ferroelastic fingerprints appears to strongly depend on the film texture and thus the preparation route. The formation of the ferroelastic twin domains could be induced by internal strain during the cubic-tetragonal phase transition.

  2. Experimental quantum fingerprinting with weak coherent pulses

    Science.gov (United States)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-10-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity.

  3. Experimental quantum fingerprinting with weak coherent pulses

    Science.gov (United States)

    Xu, Feihu; Arrazola, Juan Miguel; Wei, Kejin; Wang, Wenyuan; Palacios-Avila, Pablo; Feng, Chen; Sajeed, Shihan; Lütkenhaus, Norbert; Lo, Hoi-Kwong

    2015-01-01

    Quantum communication holds the promise of creating disruptive technologies that will play an essential role in future communication networks. For example, the study of quantum communication complexity has shown that quantum communication allows exponential reductions in the information that must be transmitted to solve distributed computational tasks. Recently, protocols that realize this advantage using optical implementations have been proposed. Here we report a proof-of-concept experimental demonstration of a quantum fingerprinting system that is capable of transmitting less information than the best-known classical protocol. Our implementation is based on a modified version of a commercial quantum key distribution system using off-the-shelf optical components over telecom wavelengths, and is practical for messages as large as 100 Mbits, even in the presence of experimental imperfections. Our results provide a first step in the development of experimental quantum communication complexity. PMID:26515586

  4. MR fingerprinting with simultaneous B1 estimation.

    Science.gov (United States)

    Buonincontri, Guido; Sawiak, Stephen J

    2016-10-01

    MR fingerprinting (MRF) can be used for quantitative estimation of physical parameters in MRI. Here, we extend the method to incorporate B1 estimation. The acquisition is based on steady state free precession MR fingerprinting with a Cartesian trajectory. To increase the sensitivity to the B1 profile, abrupt changes in flip angle were introduced in the sequence. Slice profile and B1 effects were included in the dictionary and the results from two- and three-dimensional (3D) acquisitions were compared. Acceleration was demonstrated using retrospective undersampling in the phase encode directions of 3D data exploiting redundancy between MRF frames at the edges of k-space. Without B1 estimation, T2 and B1 were inaccurate by more than 20%. Abrupt changes in flip angle improved B1 maps. T1 and T2 values obtained with the new MRF methods agree with classical spin echo measurements and are independent of the B1 field profile. When using view sharing reconstruction, results remained accurate (error Reson Med 76:1127-1135, 2016. © 2015 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine. This is an open access article under the terms of the Creative Commons Attribution-NonCommercial-NoDerivs License, which permits use and distribution in any medium, provided the original work is properly cited, the use is non-commercial and no modifications or adaptations are made. © 2015 The Authors Magnetic Resonance in Medicine published by Wiley Periodicals, Inc. on behalf of International Society for Magnetic Resonance in Medicine.

  5. Gender Recognition from Unconstrained and Articulated Human Body

    Science.gov (United States)

    Wu, Qin; Guo, Guodong

    2014-01-01

    Gender recognition has many useful applications, ranging from business intelligence to image search and social activity analysis. Traditional research on gender recognition focuses on face images in a constrained environment. This paper proposes a method for gender recognition in articulated human body images acquired from an unconstrained environment in the real world. A systematic study of some critical issues in body-based gender recognition, such as which body parts are informative, how many body parts are needed to combine together, and what representations are good for articulated body-based gender recognition, is also presented. This paper also pursues data fusion schemes and efficient feature dimensionality reduction based on the partial least squares estimation. Extensive experiments are performed on two unconstrained databases which have not been explored before for gender recognition. PMID:24977203

  6. Gender recognition from unconstrained and articulated human body.

    Science.gov (United States)

    Wu, Qin; Guo, Guodong

    2014-01-01

    Gender recognition has many useful applications, ranging from business intelligence to image search and social activity analysis. Traditional research on gender recognition focuses on face images in a constrained environment. This paper proposes a method for gender recognition in articulated human body images acquired from an unconstrained environment in the real world. A systematic study of some critical issues in body-based gender recognition, such as which body parts are informative, how many body parts are needed to combine together, and what representations are good for articulated body-based gender recognition, is also presented. This paper also pursues data fusion schemes and efficient feature dimensionality reduction based on the partial least squares estimation. Extensive experiments are performed on two unconstrained databases which have not been explored before for gender recognition.

  7. New analytic unitarization schemes

    International Nuclear Information System (INIS)

    Cudell, J.-R.; Predazzi, E.; Selyugin, O. V.

    2009-01-01

    We consider two well-known classes of unitarization of Born amplitudes of hadron elastic scattering. The standard class, which saturates at the black-disk limit includes the standard eikonal representation, while the other class, which goes beyond the black-disk limit to reach the full unitarity circle, includes the U matrix. It is shown that the basic properties of these schemes are independent of the functional form used for the unitarization, and that U matrix and eikonal schemes can be extended to have similar properties. A common form of unitarization is proposed interpolating between both classes. The correspondence with different nonlinear equations are also briefly examined.

  8. Fast 3D magnetic resonance fingerprinting for a whole-brain coverage.

    Science.gov (United States)

    Ma, Dan; Jiang, Yun; Chen, Yong; McGivney, Debra; Mehta, Bhairav; Gulani, Vikas; Griswold, Mark

    2018-04-01

    The purpose of this study was to accelerate the acquisition and reconstruction time of 3D magnetic resonance fingerprinting scans. A 3D magnetic resonance fingerprinting scan was accelerated by using a single-shot spiral trajectory with an undersampling factor of 48 in the x-y plane, and an interleaved sampling pattern with an undersampling factor of 3 through plane. Further acceleration came from reducing the waiting time between neighboring partitions. The reconstruction time was accelerated by applying singular value decomposition compression in k-space. Finally, a 3D premeasured B 1 map was used to correct for the B 1 inhomogeneity. The T 1 and T 2 values of the International Society for Magnetic Resonance in Medicine/National Institute of Standards and Technology MRI phantom showed a good agreement with the standard values, with an average concordance correlation coefficient of 0.99, and coefficient of variation of 7% in the repeatability scans. The results from in vivo scans also showed high image quality in both transverse and coronal views. This study applied a fast acquisition scheme for a fully quantitative 3D magnetic resonance fingerprinting scan with a total acceleration factor of 144 as compared with the Nyquist rate, such that 3D T 1 , T 2 , and proton density maps can be acquired with whole-brain coverage at clinical resolution in less than 5 min. Magn Reson Med 79:2190-2197, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  9. Face Detection and Recognition

    National Research Council Canada - National Science Library

    Jain, Anil K

    2004-01-01

    This report describes research efforts towards developing algorithms for a robust face recognition system to overcome many of the limitations found in existing two-dimensional facial recognition systems...

  10. Microbial DNA fingerprinting of human fingerprints: dynamic colonization of fingertip microflora challenges human host inferences for forensic purposes.

    Science.gov (United States)

    Tims, Sebastian; van Wamel, Willem; Endtz, Hubert P; van Belkum, Alex; Kayser, Manfred

    2010-09-01

    Human fingertip microflora is transferred to touched objects and may provide forensically relevant information on individual hosts, such as on geographic origins, if endogenous microbial skin species/strains would be retrievable from physical fingerprints and would carry geographically restricted DNA diversity. We tested the suitability of physical fingerprints for revealing human host information, with geographic inference as example, via microbial DNA fingerprinting. We showed that the transient exogenous fingertip microflora is frequently different from the resident endogenous bacteria of the same individuals. In only 54% of the experiments, the DNA analysis of the transient fingertip microflora allowed the detection of defined, but often not the major, elements of the resident microflora. Although we found microbial persistency in certain individuals, time-wise variation of transient and resident microflora within individuals was also observed when resampling fingerprints after 3 weeks. While microbial species differed considerably in their frequency spectrum between fingerprint samples from volunteers in Europe and southern Asia, there was no clear geographic distinction between Staphylococcus strains in a cluster analysis, although bacterial genotypes did not overlap between both continental regions. Our results, though limited in quantity, clearly demonstrate that the dynamic fingerprint microflora challenges human host inferences for forensic purposes including geographic ones. Overall, our results suggest that human fingerprint microflora is too dynamic to allow for forensic marker developments for retrieving human information.

  11. An Introduction to Face Recognition Technology

    Directory of Open Access Journals (Sweden)

    Shang-Hung Lin

    2000-01-01

    Full Text Available Recently face recognition is attracting much attention in the society of network multimedia information access.  Areas such as network security, content indexing and retrieval, and video compression benefits from face recognition technology because "people" are the center of attention in a lot of video.  Network access control via face recognition not only makes hackers virtually impossible to steal one's "password", but also increases the user-friendliness in human-computer interaction.  Indexing and/or retrieving video data based on the appearances of particular persons will be useful for users such as news reporters, political scientists, and moviegoers.  For the applications of videophone and teleconferencing, the assistance of face recognition also provides a more efficient coding scheme.  In this paper, we give an introductory course of this new information processing technology.  The paper shows the readers the generic framework for the face recognition system, and the variants that are frequently encountered by the face recognizer.  Several famous face recognition algorithms, such as eigenfaces and neural networks, will also be explained.

  12. Multispectral Palmprint Recognition Using a Quaternion Matrix

    Directory of Open Access Journals (Sweden)

    Yafeng Li

    2012-04-01

    Full Text Available Palmprints have been widely studied for biometric recognition for many years. Traditionally, a white light source is used for illumination. Recently, multispectral imaging has drawn attention because of its high recognition accuracy. Multispectral palmprint systems can provide more discriminant information under different illuminations in a short time, thus they can achieve better recognition accuracy. Previously, multispectral palmprint images were taken as a kind of multi-modal biometrics, and the fusion scheme on the image level or matching score level was used. However, some spectral information will be lost during image level or matching score level fusion. In this study, we propose a new method for multispectral images based on a quaternion model which could fully utilize the multispectral information. Firstly, multispectral palmprint images captured under red, green, blue and near-infrared (NIR illuminations were represented by a quaternion matrix, then principal component analysis (PCA and discrete wavelet transform (DWT were applied respectively on the matrix to extract palmprint features. After that, Euclidean distance was used to measure the dissimilarity between different features. Finally, the sum of two distances and the nearest neighborhood classifier were employed for recognition decision. Experimental results showed that using the quaternion matrix can achieve a higher recognition rate. Given 3000 test samples from 500 palms, the recognition rate can be as high as 98.83%.

  13. Graphical symbol recognition

    OpenAIRE

    K.C. , Santosh; Wendling , Laurent

    2015-01-01

    International audience; The chapter focuses on one of the key issues in document image processing i.e., graphical symbol recognition. Graphical symbol recognition is a sub-field of a larger research domain: pattern recognition. The chapter covers several approaches (i.e., statistical, structural and syntactic) and specially designed symbol recognition techniques inspired by real-world industrial problems. It, in general, contains research problems, state-of-the-art methods that convey basic s...

  14. [Identification of two varieties of Citri Fructus by fingerprint and chemometrics].

    Science.gov (United States)

    Su, Jing-hua; Zhang, Chao; Sun, Lei; Gu, Bing-ren; Ma, Shuang-cheng

    2015-06-01

    Citri Fructus identification by fingerprint and chemometrics was investigated in this paper. Twenty-three Citri Fructus samples were collected which referred to two varieties as Cirtus wilsonii and C. medica recorded in Chinese Pharmacopoeia. HPLC chromatograms were obtained. The components were partly identified by reference substances, and then common pattern was established for chemometrics analysis. Similarity analysis, principal component analysis (PCA) , partial least squares-discriminant analysis (PLS-DA) and hierarchical cluster analysis heatmap were applied. The results indicated that C. wilsonii and C. medica could be ideally classified with common pattern contained twenty-five characteristic peaks. Besides, preliminary pattern recognition had verified the chemometrics analytical results. Absolute peak area (APA) was used for relevant quantitative analysis, results showed the differences between two varieties and it was valuable for further quality control as selection of characteristic components.

  15. Fingerprinting of complex mixtures with the use of high performance liquid chromatography, inductively coupled plasma atomic emission spectroscopy and chemometrics

    International Nuclear Information System (INIS)

    Ni Yongnian; Peng Yunyan; Kokot, Serge

    2008-01-01

    The molecular and metal profile fingerprints were obtained from a complex substance, Atractylis chinensis DC-a traditional Chinese medicine (TCM), with the use of the high performance liquid chromatography (HPLC) and inductively coupled plasma atomic emission spectroscopy (ICP-AES) techniques. This substance was used in this work as an example of a complex biological material, which has found application as a TCM. Such TCM samples are traditionally processed by the Bran, Cut, Fried and Swill methods, and were collected from five provinces in China. The data matrices obtained from the two types of analysis produced two principal component biplots, which showed that the HPLC fingerprint data were discriminated on the basis of the methods for processing the raw TCM, while the metal analysis grouped according to the geographical origin. When the two data matrices were combined into a one two-way matrix, the resulting biplot showed a clear separation on the basis of the HPLC fingerprints. Importantly, within each different grouping the objects separated according to their geographical origin, and they ranked approximately in the same order in each group. This result suggested that by using such an approach, it is possible to derive improved characterisation of the complex TCM materials on the basis of the two kinds of analytical data. In addition, two supervised pattern recognition methods, K-nearest neighbors (KNNs) method, and linear discriminant analysis (LDA), were successfully applied to the individual data matrices-thus, supporting the PCA approach

  16. FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques

    OpenAIRE

    Laperdrix , Pierre; Baudry , Benoit; Mishra , Vikas

    2017-01-01

    International audience; The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint. A small number of queries on these interfaces are sufficient to build a fingerprint that is statistically unique and very stable over time. Consequently, the fingerprint can be used to track users. Our work aims at mitigating the risk of browser fingerprinting for users privacy by 'breaking' the stability of a fingerprint over time. We add randomness in the...

  17. 4. Payment Schemes

    Indian Academy of Sciences (India)

    Home; Journals; Resonance – Journal of Science Education; Volume 6; Issue 2. Electronic Commerce - Payment Schemes. V Rajaraman. Series Article Volume 6 Issue 2 February 2001 pp 6-13. Fulltext. Click here to view fulltext PDF. Permanent link: https://www.ias.ac.in/article/fulltext/reso/006/02/0006-0013 ...

  18. Contract saving schemes

    NARCIS (Netherlands)

    Ronald, R.; Smith, S.J.; Elsinga, M.; Eng, O.S.; Fox O'Mahony, L.; Wachter, S.

    2012-01-01

    Contractual saving schemes for housing are institutionalised savings programmes normally linked to rights to loans for home purchase. They are diverse types as they have been developed differently in each national context, but normally fall into categories of open, closed, compulsory, and ‘free

  19. Alternative reprocessing schemes evaluation

    International Nuclear Information System (INIS)

    1979-02-01

    This paper reviews the parameters which determine the inaccessibility of the plutonium in reprocessing plants. Among the various parameters, the physical and chemical characteristics of the materials, the various processing schemes and the confinement are considered. The emphasis is placed on that latter parameter, and the advantages of an increased confinement in the socalled PIPEX reprocessing plant type are presented

  20. Introduction to association schemes

    NARCIS (Netherlands)

    Seidel, J.J.

    1991-01-01

    The present paper gives an introduction to the theory of association schemes, following Bose-Mesner (1959), Biggs (1974), Delsarte (1973), Bannai-Ito (1984) and Brouwer-Cohen-Neumaier (1989). Apart from definitions and many examples, also several proofs and some problems are included. The paragraphs

  1. Reaction schemes of immunoanalysis

    International Nuclear Information System (INIS)

    Delaage, M.; Barbet, J.

    1991-01-01

    The authors apply a general theory for multiple equilibria to the reaction schemes of immunoanalysis, competition and sandwich. This approach allows the manufacturer to optimize the system and provide the user with interpolation functions for the standard curve and its first derivative as well, thus giving access to variance [fr

  2. Alternative health insurance schemes

    DEFF Research Database (Denmark)

    Keiding, Hans; Hansen, Bodil O.

    2002-01-01

    In this paper, we present a simple model of health insurance with asymmetric information, where we compare two alternative ways of organizing the insurance market. Either as a competitive insurance market, where some risks remain uninsured, or as a compulsory scheme, where however, the level...... competitive insurance; this situation turns out to be at least as good as either of the alternatives...

  3. An Analysis of the Privacy Threat in Vehicular Ad Hoc Networks due to Radio Frequency Fingerprinting

    Directory of Open Access Journals (Sweden)

    Gianmarco Baldini

    2017-01-01

    Full Text Available In Vehicular Ad Hoc Networks (VANETs used in the road transportation sector, privacy risks may arise because vehicles could be tracked on the basis of the information transmitted by the Vehicle to Vehicle (V2V and Vehicle to Infrastructure (V2I communications implemented with the Dedicated Short Range Communications (DSRC standards operating at 5.9 GHz. Various techniques have been proposed in the literature to mitigate these privacy risks including the use of pseudonym schemes, but they are mostly focused on data anonymization at the network and application layer. At the physical layer, the capability to accurately identify and fingerprint wireless devices through their radio frequency (RF emissions has been demonstrated in the literature. This capability may generate a privacy threat because vehicles can be tracked using the RF emissions of their DSRC devices. This paper investigates the privacy risks related to RF fingerprinting to determine if privacy breaches are feasible in practice. In particular, this paper analyzes the tracking accuracy in challenging RF environments with high attenuation and fading.

  4. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    Science.gov (United States)

    Salamon, H; Segal, M R; Ponce de Leon, A; Small, P M

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is positively correlated for fragments within a lane, an align-and-count method that compensates for relative scaling of lanes reliably counts matching fragments between lanes. Results of a two-step method we developed to cluster identical fingerprints agree closely with 5 years of computer-assisted visual matching among 1,335 M. tuberculosis fingerprints. Fully documented and validated methods of automated comparison and clustering will greatly expand the scope of molecular epidemiology.

  5. A Karnaugh-Map based fingerprint minutiae extraction method

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Fingerprint is one of the most promising method among all the biometric techniques and has been used for thepersonal authentication for a long time because of its wide acceptance and reliability. Features (Minutiae are extracted fromthe fingerprint in question and are compared with the features already stored in the database for authentication. Crossingnumber (CN is the most commonly used minutiae extraction method for fingerprints. In this paper, a new Karnaugh-Mapbased fingerprint minutiae extraction method has been proposed and discussed. In the proposed algorithm the 8 neighborsof a pixel in a 33 window are arranged as 8 bits of a byte and corresponding hexadecimal (hex value is calculated. Thesehex values are simplified using standard Karnaugh-Map (K-map technique to obtain the minimized logical expression.Experiments conducted on the FVC2002/Db1_a database reveals that the developed method is better than the crossingnumber (CN method.

  6. An improved Hough transform-based fingerprint alignment approach

    CSIR Research Space (South Africa)

    Mlambo, CS

    2014-11-01

    Full Text Available An improved Hough Transform based fingerprint alignment approach is presented, which improves computing time and memory usage with accurate alignment parameter (rotation and translation) results. This is achieved by studying the strengths...

  7. Chemical characterization of fingerprints from adults and children

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, M.V.; Asano, K. [Oak Ridge National Lab., TN (United States); Bohanon, A. [Knoxville Police Dept., TN (United States)

    1996-12-31

    Observation that children`s fingerprints disappear from surfaces more quickly than adults`, initiated a study to characterize the chemical components in fingerprints. Samples were obtained from about 50 individuals ranging in age from 3 to 64 by extracting chemicals from the fingertips using rubbing alcohol. Using combined gas chromatography/mass spectrometry, a wide range of compounds were identified. Samples from children contained higher levels of relatively volatile free fatty acids, while those from adults had higher levels of less volatile long chain esters of fatty acids. These esters are thought to originate from sebaceous glands located on the face and levels of these compounds increase substantially after puberty. Also, other compounds were observed that could be used to develop improved methods for fingerprint detection at a crime scene. Further, observation of specific compounds raises the possibility of being able to identify personal traits (gender, habits, diseases, etc. ) via analysis of components in fingerprints and/or skin.

  8. Development of quality control system for fingerprint comparison processes

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2017-01-01

    Full Text Available Fingerprint evidence played an important role in investigation, prosecution, and trial process due to the belief of its uniqueness and unchanged characteristics. However, in recent years, the science behind the process of fingerprint comparisons has been questioned. Main research questions have been focusing on the opaqueness within the comparison processes, subjective judgments, lack of universal standards, no error rate expression on final conclusions, and poor scientific fundamental research data. Facing the above-mentioned questions, this paper aims to suggest a quality control system (QCS for fingerprint comparison processes. This QCS is based on the use of software (PiAnoS and its technological features, being able to provide a data management model to increase the transparency and quality of fingerprint comparison processes.

  9. Performance characterization of structured light-based fingerprint scanner

    Science.gov (United States)

    Hassebrook, Laurence G.; Wang, Minghao; Daley, Raymond C.

    2013-05-01

    Our group believes that the evolution of fingerprint capture technology is in transition to include 3-D non-contact fingerprint capture. More specifically we believe that systems based on structured light illumination provide the highest level of depth measurement accuracy. However, for these new technologies to be fully accepted by the biometric community, they must be compliant with federal standards of performance. At present these standards do not exist for this new biometric technology. We propose and define a set of test procedures to be used to verify compliance with the Federal Bureau of Investigation's image quality specification for Personal Identity Verification single fingerprint capture devices. The proposed test procedures include: geometric accuracy, lateral resolution based on intensity or depth, gray level uniformity and flattened fingerprint image quality. Several 2-D contact analogies, performance tradeoffs and optimization dilemmas are evaluated and proposed solutions are presented.

  10. SwyftTapp: An NFC based attendance system using fingerprint ...

    African Journals Online (AJOL)

    In this paper we discuss the use of NFC technology coupled with fingerprint ... The Department of Computer Engineering, KNUST was used as the scope .... The software design of the project, as shown in Figure 3, involved three main ...

  11. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms...... or interpretations of recognition and toleration are considered, confusing and problematic uses of the terms are noted, and the compatibility of toleration and recognition is discussed. The article argues that there is a range of legitimate and importantly different conceptions of both toleration and recognition...

  12. Impedance spectral fingerprint of E. coli cells on interdigitated electrodes: A new approach for label free and selective detection

    Directory of Open Access Journals (Sweden)

    Maria Mallén-Alberdi

    2016-03-01

    Full Text Available Impedance-based biosensors for bacterial detection offer a rapid and cost-effective alternative to conventional techniques that are time-consuming and require specialized equipment and trained users. In this work, a new bacteria detection scheme is presented based on impedance measurements with antibody-modified polysilicon interdigitated electrodes (3 μm pitch, IDEs. The detection approach was carried out taking advantage of the E. coli structure which, in electrical terms, is constituted by two insulating cell membranes that separate a conductive cytoplasmatic medium and a more conductive periplasm. Impedance detection of bacteria is usually analyzed using electrical equivalent circuit models that show limitations for the interpretation of such complex cell structure. Here, a differential impedance spectrum representation is used to study the unique fingerprint that arises when bacteria attach to the surface of IDEs. That fingerprint shows the dual electrical behavior, insulating and conductive, at different frequency ranges. In parallel, finite-element simulations of this system using a three-shell bacteria model are performed to explain such phenomena. Overall, a new approach to detect bacteria is proposed that also enables to differentiate viable bacteria from other components non-specifically attached to the IDE surface by just detecting their spectral fingerprints. Keywords: Impedance spectroscopy, Bacterial detection, Interdigitated electrodes, Label-free detection, Immuno-detection, E. coli O157:H7

  13. Application of DNA fingerprints for cell-line individualization.

    OpenAIRE

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-01-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they d...

  14. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    OpenAIRE

    Salamon, H.; Segal, M. R.; Ponce de Leon, A.; Small, P. M.

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is ...

  15. Algorithm comparison for schedule optimization in MR fingerprinting.

    Science.gov (United States)

    Cohen, Ouri; Rosen, Matthew S

    2017-09-01

    In MR Fingerprinting, the flip angles and repetition times are chosen according to a pseudorandom schedule. In previous work, we have shown that maximizing the discrimination between different tissue types by optimizing the acquisition schedule allows reductions in the number of measurements required. The ideal optimization algorithm for this application remains unknown, however. In this work we examine several different optimization algorithms to determine the one best suited for optimizing MR Fingerprinting acquisition schedules. Copyright © 2017 Elsevier Inc. All rights reserved.

  16. Human matching performance of genuine crime scene latent fingerprints.

    Science.gov (United States)

    Thompson, Matthew B; Tangen, Jason M; McCarthy, Duncan J

    2014-02-01

    There has been very little research into the nature and development of fingerprint matching expertise. Here we present the results of an experiment testing the claimed matching expertise of fingerprint examiners. Expert (n = 37), intermediate trainee (n = 8), new trainee (n = 9), and novice (n = 37) participants performed a fingerprint discrimination task involving genuine crime scene latent fingerprints, their matches, and highly similar distractors, in a signal detection paradigm. Results show that qualified, court-practicing fingerprint experts were exceedingly accurate compared with novices. Experts showed a conservative response bias, tending to err on the side of caution by making more errors of the sort that could allow a guilty person to escape detection than errors of the sort that could falsely incriminate an innocent person. The superior performance of experts was not simply a function of their ability to match prints, per se, but a result of their ability to identify the highly similar, but nonmatching fingerprints as such. Comparing these results with previous experiments, experts were even more conservative in their decision making when dealing with these genuine crime scene prints than when dealing with simulated crime scene prints, and this conservatism made them relatively less accurate overall. Intermediate trainees-despite their lack of qualification and average 3.5 years experience-performed about as accurately as qualified experts who had an average 17.5 years experience. New trainees-despite their 5-week, full-time training course or their 6 months experience-were not any better than novices at discriminating matching and similar nonmatching prints, they were just more conservative. Further research is required to determine the precise nature of fingerprint matching expertise and the factors that influence performance. The findings of this representative, lab-based experiment may have implications for the way fingerprint examiners testify in

  17. Mid-infrared supercontinuum generation in the fingerprint region

    DEFF Research Database (Denmark)

    Møller, Uffe Visbech; Petersen, Christian Rosenberg; Kubat, Irnis

    The mid-infrared spectral region is of great technical and scientific interest because most molecules display fundamental vibrational absorptions in this region, leaving distinctive spectral fingerprints. Here, we demonstrate experimentally that launching intense ultra-short pulses with a central...... the potential of fibres to emit across the mid-infrared molecular fingerprint region, which is of key importance for applications such as early cancer diagnostics, gas sensing and food quality control....

  18. H.264/AVC digital fingerprinting based on spatio-temporal just noticeable distortion

    Science.gov (United States)

    Ait Saadi, Karima; Bouridane, Ahmed; Guessoum, Abderrezak

    2014-01-01

    This paper presents a robust adaptive embedding scheme using a modified Spatio-Temporal noticeable distortion (JND) model that is designed for tracing the distribution of the H.264/AVC video content and protecting them from unauthorized redistribution. The Embedding process is performed during coding process in selected macroblocks type Intra 4x4 within I-Frame. The method uses spread-spectrum technique in order to obtain robustness against collusion attacks and the JND model to dynamically adjust the embedding strength and control the energy of the embedded fingerprints so as to ensure their imperceptibility. Linear and non linear collusion attacks are performed to show the robustness of the proposed technique against collusion attacks while maintaining visual quality unchanged.

  19. Establishment and application of milk fingerprint by gel filtration chromatography.

    Science.gov (United States)

    Gao, P; Li, J; Li, Z; Hao, J; Zan, L

    2016-12-01

    Raw milk adulteration frequently occurs in undeveloped countries. It not only reduces the nutritional value of milk, but it is also harmful to consumers. In this paper, we focused on investigating an efficient method for the quality control of raw milk protein. A gel filtration chromatography (GFC) fingerprint method combined with chemometrics was developed for fingerprint analysis of raw milk. To optimize the GFC conditions, milk fat was removed by centrifugation, and GFC analysis was performed on a Superdex 75 10/300GL column (Just Scientific, Shanghai, China) with 0.2 M NaH 2 PO 4 -Na 2 HPO 4 buffer (pH 7.0) as the mobile phase. The flow rate was 0.5mL/min, and the detection wavelength was set at 280 nm. Ten batches of 120 raw milk samples were analyzed to establish the GFC fingerprint under optimal conditions. Six major peaks common to the chromatogram of each raw milk sample were selected for fingerprint analysis, and the characteristic peaks were used to establish a standard chromatographic fingerprint. Principal component analysis was then applied to classify GFC information of adulterated milk and raw milk, allowing adulterated samples to be effectively screened out from the raw milk in principal component analysis scores plot. The fingerprint method demonstrates promising features in detecting milk protein adulteration. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  20. Towards reconstruction of overlapping fingerprints using plasma spectroscopy

    Science.gov (United States)

    Yang, Jun-Ho; Choi, Soo-Jin; Yoh, Jack J.

    2017-08-01

    Chemical analysis is commonly used in the field of forensic science where the precise discrimination of primary evidence is of significant importance. Laser-Induced Breakdown Spectroscopy (LIBS) exceeds other spectroscopic methods in terms of the time required for pre- and post-sample preparation, the insensitivity to sample phase state be it solid, liquid, or gas, and the detection of two-dimensional spectral mapping from real time point measurements. In this research, fingerprint samples on various surface materials are considered in the chemical detection and reconstruction of fingerprints using the two-dimensional LIBS technique. Strong and distinct intensities of specific wavelengths represent visible ink, natural secretion of sweat, and contaminants from the environment, all of which can be present in latent fingerprints. The particular aim of the work presented here is to enhance the precision of the two-dimensional recreation of the fingerprints present on metal, plastic, and artificially prepared soil surface using LIBS with principal component analysis. By applying a distinct wavelength discrimination for two overlapping fingerprint samples, separation into two non-identical chemical fingerprints was successfully performed.

  1. Evaluation of fingerprint deformation using optical coherence tomography

    Science.gov (United States)

    Gutierrez da Costa, Henrique S.; Maxey, Jessica R.; Silva, Luciano; Ellerbee, Audrey K.

    2014-02-01

    Biometric identification systems have important applications to privacy and security. The most widely used of these, print identification, is based on imaging patterns present in the fingers, hands and feet that are formed by the ridges, valleys and pores of the skin. Most modern print sensors acquire images of the finger when pressed against a sensor surface. Unfortunately, this pressure may result in deformations, characterized by changes in the sizes and relative distances of the print patterns, and such changes have been shown to negatively affect the performance of fingerprint identification algorithms. Optical coherence tomography (OCT) is a novel imaging technique that is capable of imaging the subsurface of biological tissue. Hence, OCT may be used to obtain images of subdermal skin structures from which one can extract an internal fingerprint. The internal fingerprint is very similar in structure to the commonly used external fingerprint and is of increasing interest in investigations of identify fraud. We proposed and tested metrics based on measurements calculated from external and internal fingerprints to evaluate the amount of deformation of the skin. Such metrics were used to test hypotheses about the differences of deformation between the internal and external images, variations with the type of finger and location inside the fingerprint.

  2. Multifragment alleles in DNA fingerprints of the parrot, Amazona ventralis

    Science.gov (United States)

    Brock, M.K.; White, B.N.

    1991-01-01

    Human DNA probes that identify variable numbers of tandem repeat loci are being used to generate DNA fingerprints in many animal and plant species. In most species the majority of the sc rable autoradiographic bands of the DNA fingerprint represent alleles from numerous unlinked loci. This study was initiated to use DNA fingerprints to determine the amount of band-sharing among captive Hispaniolan parrots (Amazona ventralis) with known genetic relationships. This would form the data base to examine DNA fingerprints of the closely related and endangered Puerto Rican parrot (A. vittata) and to estimate the degree of inbreeding in the relic population. We found by segregation analysis of the bands scored in the DNA fingerprints of the Hispaniolan parrots that there may be as few as two to five loci identified by the human 33.15 probe. Furthermore, at one locus we identified seven alleles, one of which is represented by as many as 19 cosegregating bands. It is unknown how common multiband alleles might be in natural populations, and their existence will cause problems in the assessment of relatedness by band-sharing analysis. We believe, therefore, that a pedigree analysis should be included in all DNA fingerprinting studies, where possible, in order to estimate the number of loci identified by a minisatellite DNA probe and to examine the nature of their alleles.

  3. DNA fingerprinting of the NCI-60 cell line panel.

    Science.gov (United States)

    Lorenzi, Philip L; Reinhold, William C; Varma, Sudhir; Hutchinson, Amy A; Pommier, Yves; Chanock, Stephen J; Weinstein, John N

    2009-04-01

    The National Cancer Institute's NCI-60 cell line panel, the most extensively characterized set of cells in existence and a public resource, is frequently used as a screening tool for drug discovery. Because many laboratories around the world rely on data from the NCI-60 cells, confirmation of their genetic identities represents an essential step in validating results from them. Given the consequences of cell line contamination or misidentification, quality control measures should routinely include DNA fingerprinting. We have, therefore, used standard DNA microsatellite short tandem repeats to profile the NCI-60, and the resulting DNA fingerprints are provided here as a reference. Consistent with previous reports, the fingerprints suggest that several NCI-60 lines have common origins: the melanoma lines MDA-MB-435, MDA-N, and M14; the central nervous system lines U251 and SNB-19; the ovarian lines OVCAR-8 and OVCAR-8/ADR (also called NCI/ADR); and the prostate lines DU-145, DU-145 (ATCC), and RC0.1. Those lines also show that the ability to connect two fingerprints to the same origin is not affected by stable transfection or by the development of multidrug resistance. As expected, DNA fingerprints were not able to distinguish different tissues-of-origin. The fingerprints serve principally as a barcodes.

  4. Practical Fingerprinting Localization for Indoor Positioning System by Using Beacons

    Directory of Open Access Journals (Sweden)

    Santosh Subedi

    2017-01-01

    Full Text Available Recent developments in the fields of smartphones and wireless communication technologies such as beacons, Wi-Fi, and ultra-wideband have made it possible to realize indoor positioning system (IPS with a few meters of accuracy. In this paper, an improvement over traditional fingerprinting localization is proposed by combining it with weighted centroid localization (WCL. The proposed localization method reduces the total number of fingerprint reference points over the localization space, thus minimizing both the time required for reading radio frequency signals and the number of reference points needed during the fingerprinting learning process, which eventually makes the process less time-consuming. The proposed positioning has two major steps of operation. In the first step, we have realized fingerprinting that utilizes lightly populated reference points (RPs and WCL individually. Using the location estimated at the first step, WCL is run again for the final location estimation. The proposed localization technique reduces the number of required fingerprint RPs by more than 40% compared to normal fingerprinting localization method with a similar localization estimation error.

  5. Fingerprint: A Unique and Reliable Method for Identification

    Directory of Open Access Journals (Sweden)

    Palash Kumar Bose

    2017-01-01

    Full Text Available Fingerprints have been the gold standard for personal identification within the forensic community for more than one hundred years. It is still universal in spite of discovery of DNA fingerprint. The science of fingerprint identification has evolved over time from the early use of finger prints to mark business transactions in ancient Babylonia to their use today as core technology in biometric security devices and as scientific evidence in courts of law throughout the world. The science of fingerprints, dactylography or dermatoglyphics, had long been widely accepted, and well acclaimed and reputed as panacea for individualization, particularly in forensic investigations. Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual, making them suitable as lifelong markers of human identity. Fingerprints can be readily used by police or other authorities to identify individuals who wish to conceal their identity, or to identify people who are incapacitated or deceased, as in the aftermath of a natural disaster

  6. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.H.; Tang, K.; Taranenko, N.I.; Allman, S.L.; Chang, L.Y.

    1994-12-31

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual`s DNA structure is identical within all tissues of their body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et al. found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endonuclease sites can provide the basis for identification. The major steps for conventional DNA fingerprinting include (1) specimen processing (2) amplification of selected DNA segments by PCR, and (3) gel electrophoresis to do the final DNA analysis. In this work we propose to use laser desorption mass spectrometry for fast DNA fingerprinting. The process and advantages are discussed.

  7. MR Fingerprinting for Rapid Quantitative Abdominal Imaging.

    Science.gov (United States)

    Chen, Yong; Jiang, Yun; Pahwa, Shivani; Ma, Dan; Lu, Lan; Twieg, Michael D; Wright, Katherine L; Seiberlich, Nicole; Griswold, Mark A; Gulani, Vikas

    2016-04-01

    To develop a magnetic resonance (MR) "fingerprinting" technique for quantitative abdominal imaging. This HIPAA-compliant study had institutional review board approval, and informed consent was obtained from all subjects. To achieve accurate quantification in the presence of marked B0 and B1 field inhomogeneities, the MR fingerprinting framework was extended by using a two-dimensional fast imaging with steady-state free precession, or FISP, acquisition and a Bloch-Siegert B1 mapping method. The accuracy of the proposed technique was validated by using agarose phantoms. Quantitative measurements were performed in eight asymptomatic subjects and in six patients with 20 focal liver lesions. A two-tailed Student t test was used to compare the T1 and T2 results in metastatic adenocarcinoma with those in surrounding liver parenchyma and healthy subjects. Phantom experiments showed good agreement with standard methods in T1 and T2 after B1 correction. In vivo studies demonstrated that quantitative T1, T2, and B1 maps can be acquired within a breath hold of approximately 19 seconds. T1 and T2 measurements were compatible with those in the literature. Representative values included the following: liver, 745 msec ± 65 (standard deviation) and 31 msec ± 6; renal medulla, 1702 msec ± 205 and 60 msec ± 21; renal cortex, 1314 msec ± 77 and 47 msec ± 10; spleen, 1232 msec ± 92 and 60 msec ± 19; skeletal muscle, 1100 msec ± 59 and 44 msec ± 9; and fat, 253 msec ± 42 and 77 msec ± 16, respectively. T1 and T2 in metastatic adenocarcinoma were 1673 msec ± 331 and 43 msec ± 13, respectively, significantly different from surrounding liver parenchyma relaxation times of 840 msec ± 113 and 28 msec ± 3 (P < .0001 and P < .01) and those in hepatic parenchyma in healthy volunteers (745 msec ± 65 and 31 msec ± 6, P < .0001 and P = .021, respectively). A rapid technique for quantitative abdominal imaging was developed that allows simultaneous quantification of multiple tissue

  8. 8 CFR 1292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 1292.2...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization...

  9. On Converting Secret Sharing Scheme to Visual Secret Sharing Scheme

    Directory of Open Access Journals (Sweden)

    Wang Daoshun

    2010-01-01

    Full Text Available Abstract Traditional Secret Sharing (SS schemes reconstruct secret exactly the same as the original one but involve complex computation. Visual Secret Sharing (VSS schemes decode the secret without computation, but each share is m times as big as the original and the quality of the reconstructed secret image is reduced. Probabilistic visual secret sharing (Prob.VSS schemes for a binary image use only one subpixel to share the secret image; however the probability of white pixels in a white area is higher than that in a black area in the reconstructed secret image. SS schemes, VSS schemes, and Prob. VSS schemes have various construction methods and advantages. This paper first presents an approach to convert (transform a -SS scheme to a -VSS scheme for greyscale images. The generation of the shadow images (shares is based on Boolean XOR operation. The secret image can be reconstructed directly by performing Boolean OR operation, as in most conventional VSS schemes. Its pixel expansion is significantly smaller than that of VSS schemes. The quality of the reconstructed images, measured by average contrast, is the same as VSS schemes. Then a novel matrix-concatenation approach is used to extend the greyscale -SS scheme to a more general case of greyscale -VSS scheme.

  10. Selectively strippable paint schemes

    Science.gov (United States)

    Stein, R.; Thumm, D.; Blackford, Roger W.

    1993-03-01

    In order to meet the requirements of more environmentally acceptable paint stripping processes many different removal methods are under evaluation. These new processes can be divided into mechanical and chemical methods. ICI has developed a paint scheme with intermediate coat and fluid resistant polyurethane topcoat which can be stripped chemically in a short period of time with methylene chloride free and phenol free paint strippers.

  11. Scalable Nonlinear Compact Schemes

    Energy Technology Data Exchange (ETDEWEB)

    Ghosh, Debojyoti [Argonne National Lab. (ANL), Argonne, IL (United States); Constantinescu, Emil M. [Univ. of Chicago, IL (United States); Brown, Jed [Univ. of Colorado, Boulder, CO (United States)

    2014-04-01

    In this work, we focus on compact schemes resulting in tridiagonal systems of equations, specifically the fifth-order CRWENO scheme. We propose a scalable implementation of the nonlinear compact schemes by implementing a parallel tridiagonal solver based on the partitioning/substructuring approach. We use an iterative solver for the reduced system of equations; however, we solve this system to machine zero accuracy to ensure that no parallelization errors are introduced. It is possible to achieve machine-zero convergence with few iterations because of the diagonal dominance of the system. The number of iterations is specified a priori instead of a norm-based exit criterion, and collective communications are avoided. The overall algorithm thus involves only point-to-point communication between neighboring processors. Our implementation of the tridiagonal solver differs from and avoids the drawbacks of past efforts in the following ways: it introduces no parallelization-related approximations (multiprocessor solutions are exactly identical to uniprocessor ones), it involves minimal communication, the mathematical complexity is similar to that of the Thomas algorithm on a single processor, and it does not require any communication and computation scheduling.

  12. Optical Pattern Recognition

    Science.gov (United States)

    Yu, Francis T. S.; Jutamulia, Suganda

    2008-10-01

    Contributors; Preface; 1. Pattern recognition with optics Francis T. S. Yu and Don A. Gregory; 2. Hybrid neural networks for nonlinear pattern recognition Taiwei Lu; 3. Wavelets, optics, and pattern recognition Yao Li and Yunglong Sheng; 4. Applications of the fractional Fourier transform to optical pattern recognition David Mendlovic, Zeev Zalesky and Haldum M. Oxaktas; 5. Optical implementation of mathematical morphology Tien-Hsin Chao; 6. Nonlinear optical correlators with improved discrimination capability for object location and recognition Leonid P. Yaroslavsky; 7. Distortion-invariant quadratic filters Gregory Gheen; 8. Composite filter synthesis as applied to pattern recognition Shizhou Yin and Guowen Lu; 9. Iterative procedures in electro-optical pattern recognition Joseph Shamir; 10. Optoelectronic hybrid system for three-dimensional object pattern recognition Guoguang Mu, Mingzhe Lu and Ying Sun; 11. Applications of photrefractive devices in optical pattern recognition Ziangyang Yang; 12. Optical pattern recognition with microlasers Eung-Gi Paek; 13. Optical properties and applications of bacteriorhodopsin Q. Wang Song and Yu-He Zhang; 14. Liquid-crystal spatial light modulators Aris Tanone and Suganda Jutamulia; 15. Representations of fully complex functions on real-time spatial light modulators Robert W. Cohn and Laurence G. Hassbrook; Index.

  13. Website Fingerprinting Defenses at the Application Layer

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-04-01

    Full Text Available Website Fingerprinting (WF allows a passive network adversary to learn the websites that a client visits by analyzing traffic patterns that are unique to each website. It has been recently shown that these attacks are particularly effective against .onion sites, anonymous web servers hosted within the Tor network. Given the sensitive nature of the content of these services, the implications of WF on the Tor network are alarming. Prior work has only considered defenses at the client-side arguing that web servers lack of incentives to adopt countermeasures. Furthermore, most of these defenses have been designed to operate on the stream of network packets, making practical deployment difficult. In this paper, we propose two application-level defenses including the first server-side defense against WF, as .onion services have incentives to support it. The other defense is a lightweight client-side defense implemented as a browser add-on, improving ease of deployment over previous approaches. In our evaluations, the server-side defense is able to reduce WF accuracy on Tor .onion sites from 69.6% to 10% and the client-side defense reduces accuracy from 64% to 31.5%.

  14. DNA fingerprinting in zoology: past, present, future.

    Science.gov (United States)

    Chambers, Geoffrey K; Curtis, Caitlin; Millar, Craig D; Huynen, Leon; Lambert, David M

    2014-02-03

    In 1962, Thomas Kuhn famously argued that the progress of scientific knowledge results from periodic 'paradigm shifts' during a period of crisis in which new ideas dramatically change the status quo. Although this is generally true, Alec Jeffreys' identification of hypervariable repeat motifs in the human beta-globin gene, and the subsequent development of a technology known now as 'DNA fingerprinting', also resulted in a dramatic shift in the life sciences, particularly in ecology, evolutionary biology, and forensics. The variation Jeffreys recognized has been used to identify individuals from tissue samples of not just humans, but also of many animal species. In addition, the technology has been used to determine the sex of individuals, as well as paternity/maternity and close kinship. We review a broad range of such studies involving a wide diversity of animal species. For individual researchers, Jeffreys' invention resulted in many ecologists and evolutionary biologists being given the opportunity to develop skills in molecular biology to augment their whole organism focus. Few developments in science, even among the subsequent genome discoveries of the 21st century, have the same wide-reaching significance. Even the later development of PCR-based genotyping of individuals using microsatellite repeats sequences, and their use in determining multiple paternity, is conceptually rooted in Alec Jeffreys' pioneering work.

  15. Multiscale Reconstruction for Magnetic Resonance Fingerprinting

    Science.gov (United States)

    Pierre, Eric Y.; Ma, Dan; Chen, Yong; Badve, Chaitra; Griswold, Mark A.

    2015-01-01

    Purpose To reduce acquisition time needed to obtain reliable parametric maps with Magnetic Resonance Fingerprinting. Methods An iterative-denoising algorithm is initialized by reconstructing the MRF image series at low image resolution. For subsequent iterations, the method enforces pixel-wise fidelity to the best-matching dictionary template then enforces fidelity to the acquired data at slightly higher spatial resolution. After convergence, parametric maps with desirable spatial resolution are obtained through template matching of the final image series. The proposed method was evaluated on phantom and in-vivo data using the highly-undersampled, variable-density spiral trajectory and compared with the original MRF method. The benefits of additional sparsity constraints were also evaluated. When available, gold standard parameter maps were used to quantify the performance of each method. Results The proposed approach allowed convergence to accurate parametric maps with as few as 300 time points of acquisition, as compared to 1000 in the original MRF work. Simultaneous quantification of T1, T2, proton density (PD) and B0 field variations in the brain was achieved in vivo for a 256×256 matrix for a total acquisition time of 10.2s, representing a 3-fold reduction in acquisition time. Conclusions The proposed iterative multiscale reconstruction reliably increases MRF acquisition speed and accuracy. PMID:26132462

  16. Fast group matching for MR fingerprinting reconstruction.

    Science.gov (United States)

    Cauley, Stephen F; Setsompop, Kawin; Ma, Dan; Jiang, Yun; Ye, Huihui; Adalsteinsson, Elfar; Griswold, Mark A; Wald, Lawrence L

    2015-08-01

    MR fingerprinting (MRF) is a technique for quantitative tissue mapping using pseudorandom measurements. To estimate tissue properties such as T1 , T2 , proton density, and B0 , the rapidly acquired data are compared against a large dictionary of Bloch simulations. This matching process can be a very computationally demanding portion of MRF reconstruction. We introduce a fast group matching algorithm (GRM) that exploits inherent correlation within MRF dictionaries to create highly clustered groupings of the elements. During matching, a group specific signature is first used to remove poor matching possibilities. Group principal component analysis (PCA) is used to evaluate all remaining tissue types. In vivo 3 Tesla brain data were used to validate the accuracy of our approach. For a trueFISP sequence with over 196,000 dictionary elements, 1000 MRF samples, and image matrix of 128 × 128, GRM was able to map MR parameters within 2s using standard vendor computational resources. This is an order of magnitude faster than global PCA and nearly two orders of magnitude faster than direct matching, with comparable accuracy (1-2% relative error). The proposed GRM method is a highly efficient model reduction technique for MRF matching and should enable clinically relevant reconstruction accuracy and time on standard vendor computational resources. © 2014 Wiley Periodicals, Inc.

  17. Transmission fingerprints in quasiperiodic magnonic multilayers

    Energy Technology Data Exchange (ETDEWEB)

    Coelho, I.P. [Departamento de Ensino Superior, Instituto Federal de Educacao, Ciencia e Tecnologia do Maranhao, Imperatriz-MA 65919-050 (Brazil); Departamento de Fisica, Universidade Federal do Rio Grande do Norte, Natal-RN 59072-970 (Brazil); Vasconcelos, M.S. [Escola de Ciencias e Tecnologia, Universidade Federal do Rio Grande do Norte, Natal-RN 59072-970 (Brazil); Bezerra, C.G., E-mail: cbezerra@dfte.ufrn.br [Departamento de Fisica, Universidade Federal do Rio Grande do Norte, Natal-RN 59072-970 (Brazil)

    2011-12-15

    In this paper we investigated the influence of mirror symmetry on the transmission spectra of quasiperiodic magnonic multilayers arranged according to Fibonacci, Thue-Morse and double period quasiperiodic sequences. We consider that the multilayers composed of two simple cubic Heisenberg ferromagnets with bulk exchange constants J{sub A} and J{sub B} and spin quantum numbers S{sub A} and S{sub B}, respectively. The multilayer structure is surrounded by two semi-infinite slabs of a third Heisenberg ferromagnetic material with exchange constant J{sub C} and spin quantum number S{sub C}. For simplicity, the lattice constant has the same value a in each material, corresponding to epitaxial growth at the interfaces. The transfer matrix treatment was used for the exchange-dominated regime, taking into account the random phase approximation (RPA). Our numerical results illustrate the effects of mirror symmetry on (i) transmission spectra and (ii) transmission fingerprints. - Highlights: > We model quasiperiodic magnetic multilayers presenting mirror symmetry. > We investigated the allowed and forbidden bands of magnonic transmission. > Transmission return maps show the influence of mirror symmetry. > Mirror symmetry has no effect on the Fibonacci case. > Mirror symmetry does have effect on the Thue-Morse and double period cases.

  18. Transmission fingerprints in quasiperiodic magnonic multilayers

    International Nuclear Information System (INIS)

    Coelho, I.P.; Vasconcelos, M.S.; Bezerra, C.G.

    2011-01-01

    In this paper we investigated the influence of mirror symmetry on the transmission spectra of quasiperiodic magnonic multilayers arranged according to Fibonacci, Thue-Morse and double period quasiperiodic sequences. We consider that the multilayers composed of two simple cubic Heisenberg ferromagnets with bulk exchange constants J A and J B and spin quantum numbers S A and S B , respectively. The multilayer structure is surrounded by two semi-infinite slabs of a third Heisenberg ferromagnetic material with exchange constant J C and spin quantum number S C . For simplicity, the lattice constant has the same value a in each material, corresponding to epitaxial growth at the interfaces. The transfer matrix treatment was used for the exchange-dominated regime, taking into account the random phase approximation (RPA). Our numerical results illustrate the effects of mirror symmetry on (i) transmission spectra and (ii) transmission fingerprints. - Highlights: → We model quasiperiodic magnetic multilayers presenting mirror symmetry. → We investigated the allowed and forbidden bands of magnonic transmission. → Transmission return maps show the influence of mirror symmetry. → Mirror symmetry has no effect on the Fibonacci case. → Mirror symmetry does have effect on the Thue-Morse and double period cases.

  19. SIFT-based Ear Recognition by Fusion of Detected Keypoints from Color Similarity Slice Regions

    OpenAIRE

    Kisku, Dakshina Ranjan; Mehrotra, Hunny; Gupta, Phalguni; Sing, Jamuna Kanta

    2010-01-01

    Ear biometric is considered as one of the most reliable and invariant biometrics characteristics in line with iris and fingerprint characteristics. In many cases, ear biometrics can be compared with face biometrics regarding many physiological and texture characteristics. In this paper, a robust and efficient ear recognition system is presented, which uses Scale Invariant Feature Transform (SIFT) as feature descriptor for structural representation of ear images. In order to make it more robus...

  20. Face recognition in securing optical telecom network equipment

    International Nuclear Information System (INIS)

    Ali, N.M.

    2015-01-01

    In this paper, face recognition is used with a microcontroller based hardware module to secure the telecommunication equipments like ONU (optical network units) or any other telecommunication equipment. The face recognition classifier value optimization adaption is deployed and in this scheme by increasing or decreasing the number of images in the database will automatically generate and adopt the classifier value for recognition of known and unknown persons. On recognizing and unknown persons. On recognizing an unknown person, the hardware module will send an SMS to the concerned security personnel for security preventive measures. (author)

  1. Gender Recognition from Unconstrained and Articulated Human Body

    Directory of Open Access Journals (Sweden)

    Qin Wu

    2014-01-01

    human body images acquired from an unconstrained environment in the real world. A systematic study of some critical issues in body-based gender recognition, such as which body parts are informative, how many body parts are needed to combine together, and what representations are good for articulated body-based gender recognition, is also presented. This paper also pursues data fusion schemes and efficient feature dimensionality reduction based on the partial least squares estimation. Extensive experiments are performed on two unconstrained databases which have not been explored before for gender recognition.

  2. Image Quality Assessment for Fake Biometric Detection: Application to Iris, Fingerprint, and Face Recognition

    OpenAIRE

    Galbally, Javier; Marcel, Sebastien; Fierrez, Julian

    2014-01-01

    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. To ensure the actual presence of a real legitimate trait in contrast to a fake self-manufactured synthetic or reconstructed...

  3. Size-selected methyl lactate clusters: fragmentation and spectroscopic fingerprints of chiral recognition

    Czech Academy of Sciences Publication Activity Database

    Fárník, Michal; Weimann, M.; Steinbach, Ch.; Buck, U.; Borho, N.; Adler, T. B.; Suhm, M. A.

    2006-01-01

    Roč. 8, č. 10 (2006), s. 1148-1158 ISSN 1463-9076 Grant - others:Deutsche Forschungsgemeinschaft(DE) SFB 357; Deutsche Forschungsgemeinschaft(DE) GRK 782 Institutional research plan: CEZ:AV0Z40400503 Keywords : electron-bombardment fragmentation * methanol clusters * methanol clusters * water clusters Subject RIV: CF - Physical ; Theoretical Chemistry Impact factor: 2.892, year: 2006

  4. Noisy Ocular Recognition Based on Three Convolutional Neural Networks

    Directory of Open Access Journals (Sweden)

    Min Beom Lee

    2017-12-01

    Full Text Available In recent years, the iris recognition system has been gaining increasing acceptance for applications such as access control and smartphone security. When the images of the iris are obtained under unconstrained conditions, an issue of undermined quality is caused by optical and motion blur, off-angle view (the user’s eyes looking somewhere else, not into the front of the camera, specular reflection (SR and other factors. Such noisy iris images increase intra-individual variations and, as a result, reduce the accuracy of iris recognition. A typical iris recognition system requires a near-infrared (NIR illuminator along with an NIR camera, which are larger and more expensive than fingerprint recognition equipment. Hence, many studies have proposed methods of using iris images captured by a visible light camera without the need for an additional illuminator. In this research, we propose a new recognition method for noisy iris and ocular images by using one iris and two periocular regions, based on three convolutional neural networks (CNNs. Experiments were conducted by using the noisy iris challenge evaluation-part II (NICE.II training dataset (selected from the university of Beira iris (UBIRIS.v2 database, mobile iris challenge evaluation (MICHE database, and institute of automation of Chinese academy of sciences (CASIA-Iris-Distance database. As a result, the method proposed by this study outperformed previous methods.

  5. Noisy Ocular Recognition Based on Three Convolutional Neural Networks.

    Science.gov (United States)

    Lee, Min Beom; Hong, Hyung Gil; Park, Kang Ryoung

    2017-12-17

    In recent years, the iris recognition system has been gaining increasing acceptance for applications such as access control and smartphone security. When the images of the iris are obtained under unconstrained conditions, an issue of undermined quality is caused by optical and motion blur, off-angle view (the user's eyes looking somewhere else, not into the front of the camera), specular reflection (SR) and other factors. Such noisy iris images increase intra-individual variations and, as a result, reduce the accuracy of iris recognition. A typical iris recognition system requires a near-infrared (NIR) illuminator along with an NIR camera, which are larger and more expensive than fingerprint recognition equipment. Hence, many studies have proposed methods of using iris images captured by a visible light camera without the need for an additional illuminator. In this research, we propose a new recognition method for noisy iris and ocular images by using one iris and two periocular regions, based on three convolutional neural networks (CNNs). Experiments were conducted by using the noisy iris challenge evaluation-part II (NICE.II) training dataset (selected from the university of Beira iris (UBIRIS).v2 database), mobile iris challenge evaluation (MICHE) database, and institute of automation of Chinese academy of sciences (CASIA)-Iris-Distance database. As a result, the method proposed by this study outperformed previous methods.

  6. Improving Speaker Recognition by Biometric Voice Deconstruction

    Directory of Open Access Journals (Sweden)

    Luis Miguel eMazaira-Fernández

    2015-09-01

    Full Text Available Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g. YouTube to broadcast its message. In this new scenario, classical identification methods (such fingerprints or face recognition have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. Through the present paper, a new methodology to characterize speakers will be shown. This methodology is benefiting from the advances achieved during the last years in understanding and modelling voice production. The paper hypothesizes that a gender dependent characterization of speakers combined with the use of a new set of biometric parameters extracted from the components resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract gender-dependent extended biometric parameters are given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions.

  7. Improving Speaker Recognition by Biometric Voice Deconstruction

    Science.gov (United States)

    Mazaira-Fernandez, Luis Miguel; Álvarez-Marquina, Agustín; Gómez-Vilda, Pedro

    2015-01-01

    Person identification, especially in critical environments, has always been a subject of great interest. However, it has gained a new dimension in a world threatened by a new kind of terrorism that uses social networks (e.g., YouTube) to broadcast its message. In this new scenario, classical identification methods (such as fingerprints or face recognition) have been forcedly replaced by alternative biometric characteristics such as voice, as sometimes this is the only feature available. The present study benefits from the advances achieved during last years in understanding and modeling voice production. The paper hypothesizes that a gender-dependent characterization of speakers combined with the use of a set of features derived from the components, resulting from the deconstruction of the voice into its glottal source and vocal tract estimates, will enhance recognition rates when compared to classical approaches. A general description about the main hypothesis and the methodology followed to extract the gender-dependent extended biometric parameters is given. Experimental validation is carried out both on a highly controlled acoustic condition database, and on a mobile phone network recorded under non-controlled acoustic conditions. PMID:26442245

  8. Quality based approach for adaptive face recognition

    Science.gov (United States)

    Abboud, Ali J.; Sellahewa, Harin; Jassim, Sabah A.

    2009-05-01

    Recent advances in biometric technology have pushed towards more robust and reliable systems. We aim to build systems that have low recognition errors and are less affected by variation in recording conditions. Recognition errors are often attributed to the usage of low quality biometric samples. Hence, there is a need to develop new intelligent techniques and strategies to automatically measure/quantify the quality of biometric image samples and if necessary restore image quality according to the need of the intended application. In this paper, we present no-reference image quality measures in the spatial domain that have impact on face recognition. The first is called symmetrical adaptive local quality index (SALQI) and the second is called middle halve (MH). Also, an adaptive strategy has been developed to select the best way to restore the image quality, called symmetrical adaptive histogram equalization (SAHE). The main benefits of using quality measures for adaptive strategy are: (1) avoidance of excessive unnecessary enhancement procedures that may cause undesired artifacts, and (2) reduced computational complexity which is essential for real time applications. We test the success of the proposed measures and adaptive approach for a wavelet-based face recognition system that uses the nearest neighborhood classifier. We shall demonstrate noticeable improvements in the performance of adaptive face recognition system over the corresponding non-adaptive scheme.

  9. Application of DNA fingerprints for cell-line individualization.

    Science.gov (United States)

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-09-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they differ. The average percent difference (APD) among pairwise combinations from the population of 33 unrelated cell lines was 76.9%, compared with the APD in band sharing among cell lines derived from the same individual (less than or equal to 1.2%). Included in this survey were nine additional cell lines previously implicated as HeLa cell derivatives, and these lines were clearly confirmed as such by DNA fingerprints (APD less than or equal to 0.6%). On the basis of fragment frequencies in the tested cell line population, a simple genetic model was developed to estimate the frequencies of each DNA fingerprint in the population. The median incidence was 2.9 X 10(-17), and the range was 2.4 X 10(-21) to 6.6 X 10(-15). This value approximates the probability that a second cell line selected at random from unrelated individuals will match a given DNA fingerprint. Related calculations address the chance that any two DNA fingerprints would be identical among a large group of cell lines. This estimate is still very slight; for example, the chance of two or more common DNA fingerprints among 1 million distinct individuals is less than .001. The procedure provides a straightforward, easily interpreted, and statistically robust method for identification and individualization of human cells.

  10. Pattern recognition & machine learning

    CERN Document Server

    Anzai, Y

    1992-01-01

    This is the first text to provide a unified and self-contained introduction to visual pattern recognition and machine learning. It is useful as a general introduction to artifical intelligence and knowledge engineering, and no previous knowledge of pattern recognition or machine learning is necessary. Basic for various pattern recognition and machine learning methods. Translated from Japanese, the book also features chapter exercises, keywords, and summaries.

  11. Schemes of detecting nuclear spin correlations by dynamical decoupling based quantum sensing

    Science.gov (United States)

    Ma, Wen-Long Ma; Liu, Ren-Bao

    Single-molecule sensitivity of nuclear magnetic resonance (NMR) and angstrom resolution of magnetic resonance imaging (MRI) are the highest challenges in magnetic microscopy. Recent development in dynamical decoupling (DD) enhanced diamond quantum sensing has enabled NMR of single nuclear spins and nanoscale NMR. Similar to conventional NMR and MRI, current DD-based quantum sensing utilizes the frequency fingerprints of target nuclear spins. Such schemes, however, cannot resolve different nuclear spins that have the same noise frequency or differentiate different types of correlations in nuclear spin clusters. Here we show that the first limitation can be overcome by using wavefunction fingerprints of target nuclear spins, which is much more sensitive than the ''frequency fingerprints'' to weak hyperfine interaction between the targets and a sensor, while the second one can be overcome by a new design of two-dimensional DD sequences composed of two sets of periodic DD sequences with different periods, which can be independently set to match two different transition frequencies. Our schemes not only offer an approach to breaking the resolution limit set by ''frequency gradients'' in conventional MRI, but also provide a standard approach to correlation spectroscopy for single-molecule NMR.

  12. Fingerprint segmentation: an investigation of various techniques and a parameter study of a variance-based method

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-09-01

    Full Text Available Fingerprint image segmentation plays an important role in any fingerprint image analysis implementation and it should, ideally, be executed during the initial stages of a fingerprint manipulation process. After careful consideration of various...

  13. Statistical Pattern Recognition

    CERN Document Server

    Webb, Andrew R

    2011-01-01

    Statistical pattern recognition relates to the use of statistical techniques for analysing data measurements in order to extract information and make justified decisions.  It is a very active area of study and research, which has seen many advances in recent years. Applications such as data mining, web searching, multimedia data retrieval, face recognition, and cursive handwriting recognition, all require robust and efficient pattern recognition techniques. This third edition provides an introduction to statistical pattern theory and techniques, with material drawn from a wide range of fields,

  14. ESCAP mobile training scheme.

    Science.gov (United States)

    Yasas, F M

    1977-01-01

    In response to a United Nations resolution, the Mobile Training Scheme (MTS) was set up to provide training to the trainers of national cadres engaged in frontline and supervisory tasks in social welfare and rural development. The training is innovative in its being based on an analysis of field realities. The MTS team consisted of a leader, an expert on teaching methods and materials, and an expert on action research and evaluation. The country's trainers from different departments were sent to villages to work for a short period and to report their problems in fulfilling their roles. From these grass roots experiences, they made an analysis of the job, determining what knowledge, attitude and skills it required. Analysis of daily incidents and problems were used to produce indigenous teaching materials drawn from actual field practice. How to consider the problems encountered through government structures for policy making and decisions was also learned. Tasks of the students were to identify the skills needed for role performance by job analysis, daily diaries and project histories; to analyze the particular community by village profiles; to produce indigenous teaching materials; and to practice the role skills by actual role performance. The MTS scheme was tried in Nepal in 1974-75; 3 training programs trained 25 trainers and 51 frontline workers; indigenous teaching materials were created; technical papers written; and consultations were provided. In Afghanistan the scheme was used in 1975-76; 45 participants completed the training; seminars were held; and an ongoing Council was created. It is hoped that the training program will be expanded to other countries.

  15. Bonus schemes and trading activity

    NARCIS (Netherlands)

    Pikulina, E.S.; Renneboog, L.D.R.; ter Horst, J.R.; Tobler, P.N.

    2014-01-01

    Little is known about how different bonus schemes affect traders' propensity to trade and which bonus schemes improve traders' performance. We study the effects of linear versus threshold bonus schemes on traders' behavior. Traders buy and sell shares in an experimental stock market on the basis of

  16. Succesful labelling schemes

    DEFF Research Database (Denmark)

    Juhl, Hans Jørn; Stacey, Julia

    2001-01-01

    . In the spring of 2001 MAPP carried out an extensive consumer study with special emphasis on the Nordic environmentally friendly label 'the swan'. The purpose was to find out how much consumers actually know and use various labelling schemes. 869 households were contacted and asked to fill in a questionnaire...... it into consideration when I go shopping. The respondent was asked to pick the most suitable answer, which described her use of each label. 29% - also called 'the labelling blind' - responded that they basically only knew the recycling label and the Government controlled organic label 'Ø-mærket'. Another segment of 6...

  17. Scheme of stepmotor control

    International Nuclear Information System (INIS)

    Grashilin, V.A.; Karyshev, Yu.Ya.

    1982-01-01

    A 6-cycle scheme of step motor is described. The block-diagram and the basic circuit of the step motor control are presented. The step motor control comprises a pulse shaper, electronic commutator and power amplifiers. The step motor supply from 6-cycle electronic commutator provides for higher reliability and accuracy than from 3-cycle commutator. The control of step motor work is realised by the program given by the external source of control signals. Time-dependent diagrams for step motor control are presented. The specifications of the step-motor is given

  18. The mechanical fingerprint of murine excisional wounds.

    Science.gov (United States)

    Pensalfini, Marco; Haertel, Eric; Hopf, Raoul; Wietecha, Mateusz; Werner, Sabine; Mazza, Edoardo

    2018-01-01

    A multiscale mechanics approach to the characterization of murine excisional wounds subjected to uniaxial tensile loading is presented. Local strain analysis at a physiological level of tension uncovers the presence of two distinct regions within the wound: i) a very compliant peripheral cushion and ii) a core area undergoing modest deformation. Microstructural visualizations of stretched wound specimens show negligible engagement of the collagen located in the center of a 7-day old wound; fibers remain coiled despite the applied tension, confirming the existence of a mechanically isolated wound core. The compliant cushion located at the wound periphery appears to protect the newly-formed tissue from excessive deformation during the phase of new tissue formation. The early remodeling phase (day 14) is characterized by a restored mechanical connection between far field and wound center. The latter remains less deformable, a characteristic possibly required for cell activities during tissue remodeling. The distribution of fibrillary collagens at these two time points corresponds well to the identified heterogeneity of mechanical properties of the wound region. This novel approach provides new insight into the mechanical properties of wounded skin and will be applicable to the analysis of compound-treated wounds or wounds in genetically modified tissue. Biophysical characterization of healing wounds is crucial to assess the recovery of the skin barrier function and the associated mechanobiological processes. For the first time, we performed highly resolved local deformation analysis to identify mechanical characteristics of the wound and its periphery. Our results reveal the presence of a compliant cushion surrounding a stiffer wound core; we refer to this heterogeneous mechanical behavior as "mechanical fingerprint" of the wound. The mechanical response is shown to progress towards that of the intact skin as healing takes place. Histology and multiphoton microscopy

  19. Geomorphic process fingerprints in submarine canyons

    Science.gov (United States)

    Brothers, Daniel S.; ten Brink, Uri S.; Andrews, Brian D.; Chaytor, Jason D.; Twichell, David C.

    2013-01-01

    Submarine canyons are common features of continental margins worldwide. They are conduits that funnel vast quantities of sediment from the continents to the deep sea. Though it is known that submarine canyons form primarily from erosion induced by submarine sediment flows, we currently lack quantitative, empirically based expressions that describe the morphology of submarine canyon networks. Multibeam bathymetry data along the entire passive US Atlantic margin (USAM) and along the active central California margin near Monterey Bay provide an opportunity to examine the fine-scale morphology of 171 slope-sourced canyons. Log–log regression analyses of canyon thalweg gradient (S) versus up-canyon catchment area (A) are used to examine linkages between morphological domains and the generation and evolution of submarine sediment flows. For example, canyon reaches of the upper continental slope are characterized by steep, linear and/or convex longitudinal profiles, whereas reaches farther down canyon have distinctly concave longitudinal profiles. The transition between these geomorphic domains is inferred to represent the downslope transformation of debris flows into erosive, canyon-flushing turbidity flows. Over geologic timescales this process appears to leave behind a predictable geomorphic fingerprint that is dependent on the catchment area of the canyon head. Catchment area, in turn, may be a proxy for the volume of sediment released during geomorphically significant failures along the upper continental slope. Focused studies of slope-sourced submarine canyons may provide new insights into the relationships between fine-scale canyon morphology and down-canyon changes in sediment flow dynamics.

  20. Infrared Spectroscopy as a Chemical Fingerprinting Tool

    Science.gov (United States)

    Huff, Timothy L.

    2003-01-01

    Infrared (IR) spectroscopy is a powerful analytical tool in the chemical fingerprinting of materials. Any sample material that will interact with infrared light produces a spectrum and, although normally associated with organic materials, inorganic compounds may also be infrared active. The technique is rapid, reproducible and usually non-invasive to the sample. That it is non-invasive allows for additional characterization of the original material using other analytical techniques including thermal analysis and RAMAN spectroscopic techniques. With the appropriate accessories, the technique can be used to examine samples in liquid, solid or gas phase. Both aqueous and non-aqueous free-flowing solutions can be analyzed, as can viscous liquids such as heavy oils and greases. Solid samples of varying sizes and shapes may also be examined and with the addition of microscopic IR (microspectroscopy) capabilities, minute materials such as single fibers and threads may be analyzed. With the addition of appropriate software, microspectroscopy can be used for automated discrete point or compositional surface area mapping, with the latter providing a means to record changes in the chemical composition of a material surface over a defined area. Due to the ability to characterize gaseous samples, IR spectroscopy can also be coupled with thermal processes such as thermogravimetric (TG) analyses to provide both thermal and chemical data in a single run. In this configuration, solids (or liquids) heated in a TG analyzer undergo decomposition, with the evolving gases directed into the IR spectrometer. Thus, information is provided on the thermal properties of a material and the order in which its chemical constituents are broken down during incremental heating. Specific examples of these varied applications will be cited, with data interpretation and method limitations further discussed.

  1. Iron-Tolerant Cyanobacteria: Ecophysiology and Fingerprinting

    Science.gov (United States)

    Brown, I. I.; Mummey, D.; Lindsey, J.; McKay, D. S.

    2006-01-01

    Although the iron-dependent physiology of marine and freshwater cyanobacterial strains has been the focus of extensive study, very few studies dedicated to the physiology and diversity of cyanobacteria inhabiting iron-depositing hot springs have been conducted. One of the few studies that have been conducted [B. Pierson, 1999] found that cyanobacterial members of iron depositing bacterial mat communities might increase the rate of iron oxidation in situ and that ferrous iron concentrations up to 1 mM significantly stimulated light dependent consumption of bicarbonate, suggesting a specific role for elevated iron in photosynthesis of cyanobacteria inhabiting iron-depositing hot springs. Our recent studies pertaining to the diversity and physiology of cyanobacteria populating iron-depositing hot springs in Great Yellowstone area (Western USA) indicated a number of different isolates exhibiting elevated tolerance to Fe(3+) (up to 1 mM). Moreover, stimulation of growth was observed with increased Fe(3+) (0.02-0.4 mM). Molecular fingerprinting of unialgal isolates revealed a new cyanobacterial genus and species Chroogloeocystis siderophila, an unicellular cyanobacterium with significant EPS sheath harboring colloidal Fe(3+) from iron enriched media. Our preliminary data suggest that some filamentous species of iron-tolerant cyanobacteria are capable of exocytosis of iron precipitated in cytoplasm. Prior to 2.4 Ga global oceans were likely significantly enriched in soluble iron [Lindsay et al, 2003], conditions which are not conducive to growth of most contemporary oxygenic cyanobacteria. Thus, iron-tolerant CB may have played important physiological and evolutionary roles in Earths history.

  2. Quantifying the provenance of aeolian sediments using multiple composite fingerprints

    Science.gov (United States)

    Liu, Benli; Niu, Qinghe; Qu, Jianjun; Zu, Ruiping

    2016-09-01

    We introduce a new fingerprinting method that uses multiple composite fingerprints for studies of aeolian sediment provenance. We used this method to quantify the provenance of sediments on both sides of the Qinghai-Tibetan Railway (QTR) in the Cuona Lake section of the Tibetan Plateau (TP), in an environment characterized by aeolian and fluvial interactions. The method involves repeatedly solving a linear mixing model based on mass conservation; the model is not limited to spatial scale or transport types and uses all the tracer groups that passed the range check, Kruskal-Wallis H-test, and a strict analytical solution screening. The proportional estimates that result from using different composite fingerprints are highly variable; however, the average of these fingerprints has a greater accuracy and certainty than any single fingerprint. The results show that sand from the lake beach, hilly surface, and gullies contribute, respectively, 48%, 31% and 21% to the western railway sediments and 43%, 33% and 24% to the eastern railway sediments. The difference between contributions from various sources on either side of the railway, which may increase in the future, was clearly related to variations in local transport characteristics, a conclusion that is supported by grain size analysis. The construction of the QTR changed the local cycling of materials, and the difference in provenance between the sediments that are separated by the railway reflects the changed sedimentary conditions on either side of the railway. The effectiveness of this method suggests that it will be useful in other studies of aeolian sediments.

  3. Semantically transparent fingerprinting for right protection of digital cinema

    Science.gov (United States)

    Wu, Xiaolin

    2003-06-01

    Digital cinema, a new frontier and crown jewel of digital multimedia, has the potential of revolutionizing the science, engineering and business of movie production and distribution. The advantages of digital cinema technology over traditional analog technology are numerous and profound. But without effective and enforceable copyright protection measures, digital cinema can be more susceptible to widespread piracy, which can dampen or even prevent the commercial deployment of digital cinema. In this paper we propose a novel approach of fingerprinting each individual distribution copy of a digital movie for the purpose of tracing pirated copies back to their source. The proposed fingerprinting technique presents a fundamental departure from the traditional digital watermarking/fingerprinting techniques. Its novelty and uniqueness lie in a so-called semantic or subjective transparency property. The fingerprints are created by editing those visual and audio attributes that can be modified with semantic and subjective transparency to the audience. Semantically-transparent fingerprinting or watermarking is the most robust kind among all existing watermarking techniques, because it is content-based not sample-based, and semantically-recoverable not statistically-recoverable.

  4. Detecting anthropogenic climate change with an optimal fingerprint method

    International Nuclear Information System (INIS)

    Hegerl, G.C.; Storch, H. von; Hasselmann, K.; Santer, B.D.; Jones, P.D.

    1994-01-01

    We propose a general fingerprint strategy to detect anthropogenic climate change and present application to near surface temperature trends. An expected time-space-variable pattern of anthropogenic climate change (the 'signal') is identified through application of an appropriate optimally matched space-time filter (the 'fingerprint') to the observations. The signal and the fingerprint are represented in a space with sufficient observed and simulated data. The signal pattern is derived from a model-generated prediction of anthropogenic climate change. Application of the fingerprint filter to the data yields a scalar detection variable. The statistically optimal fingerprint is obtained by weighting the model-predicted pattern towards low-noise directions. A combination of model output and observations is used to estimate the noise characteristics of the detection variable, arising from the natural variability of climate in the absence of external forcing. We test then the null hypothesis that the observed climate change is part of natural climate variability. We conclude that a statistically significant externally induced warming has been observed, with the caveat of a possibly inadequate estimate of the internal climate variability. In order to attribute this warming uniquely to anthropogenic greenhouse gas forcing, more information on the climate's response to other forcing mechanisms (e.g. changes in solar radiation, volcanic or anthropogenic aerosols) and their interaction is needed. (orig./KW)

  5. Ridge Width Correlations between Inked Prints and Powdered Latent Fingerprints.

    Science.gov (United States)

    De Alcaraz-Fossoul, Josep; Barrot-Feixat, Carme; Zapico, Sara C; Mancenido, Michelle; Broatch, Jennifer; Roberts, Katherine A; Carreras-Marin, Clara; Tasker, Jack

    2017-10-03

    A methodology to estimate the time of latent fingerprint deposition would be of great value to law enforcement and courts. It has been observed that ridge topography changes as latent prints age, including the widths of ridges that could be measured as a function of time. Crime suspects are commonly identified using fingerprint databases that contain reference inked tenprints (flat and rolled impressions). These can be of interest in aging studies as they provide baseline information relating to the original (nonaged) ridges' widths. In practice, the age of latent fingerprints could be estimated following a comparison process between the evidentiary aged print and the corresponding reference inked print. The present article explores possible correlations between inked and fresh latent fingerprints deposited on different substrates and visualized with TiO 2 . The results indicate that the ridge width of flat inked prints is most similar to fresh latent fingerprints , and these should be used as the comparison standard for future aging studies. © 2017 American Academy of Forensic Sciences.

  6. ULTRAVIOLET RAMAN SPECTRAL SIGNATURE ACQUISITION: UV RAMAN SPECTRAL FINGERPRINTS.

    Energy Technology Data Exchange (ETDEWEB)

    SEDLACEK,III, A.J.FINFROCK,C.

    2002-09-01

    As a member of the science-support part of the ITT-lead LISA development program, BNL is tasked with the acquisition of UV Raman spectral fingerprints and associated scattering cross-sections for those chemicals-of-interest to the program's sponsor. In support of this role, the present report contains the first installment of UV Raman spectral fingerprint data on the initial subset of chemicals. Because of the unique nature associated with the acquisition of spectral fingerprints for use in spectral pattern matching algorithms (i.e., CLS, PLS, ANN) great care has been undertaken to maximize the signal-to-noise and to minimize unnecessary spectral subtractions, in an effort to provide the highest quality spectral fingerprints. This report is divided into 4 sections. The first is an Experimental section that outlines how the Raman spectra are performed. This is then followed by a section on Sample Handling. Following this, the spectral fingerprints are presented in the Results section where the data reduction process is outlined. Finally, a Photographs section is included.

  7. Comprehensive Chemical Fingerprinting of High-Quality Cocoa at Early Stages of Processing: Effectiveness of Combined Untargeted and Targeted Approaches for Classification and Discrimination.

    Science.gov (United States)

    Magagna, Federico; Guglielmetti, Alessandro; Liberto, Erica; Reichenbach, Stephen E; Allegrucci, Elena; Gobino, Guido; Bicchi, Carlo; Cordero, Chiara

    2017-08-02

    This study investigates chemical information of volatile fractions of high-quality cocoa (Theobroma cacao L. Malvaceae) from different origins (Mexico, Ecuador, Venezuela, Columbia, Java, Trinidad, and Sao Tomè) produced for fine chocolate. This study explores the evolution of the entire pattern of volatiles in relation to cocoa processing (raw, roasted, steamed, and ground beans). Advanced chemical fingerprinting (e.g., combined untargeted and targeted fingerprinting) with comprehensive two-dimensional gas chromatography coupled with mass spectrometry allows advanced pattern recognition for classification, discrimination, and sensory-quality characterization. The entire data set is analyzed for 595 reliable two-dimensional peak regions, including 130 known analytes and 13 potent odorants. Multivariate analysis with unsupervised exploration (principal component analysis) and simple supervised discrimination methods (Fisher ratios and linear regression trees) reveal informative patterns of similarities and differences and identify characteristic compounds related to sample origin and manufacturing step.

  8. Packet reversed packet combining scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2006-07-01

    The packet combining scheme is a well defined simple error correction scheme with erroneous copies at the receiver. It offers higher throughput combined with ARQ protocols in networks than that of basic ARQ protocols. But packet combining scheme fails to correct errors when the errors occur in the same bit locations of two erroneous copies. In the present work, we propose a scheme that will correct error if the errors occur at the same bit location of the erroneous copies. The proposed scheme when combined with ARQ protocol will offer higher throughput. (author)

  9. A full quantum network scheme

    International Nuclear Information System (INIS)

    Ma Hai-Qiang; Wei Ke-Jin; Yang Jian-Hui; Li Rui-Xue; Zhu Wu

    2014-01-01

    We present a full quantum network scheme using a modified BB84 protocol. Unlike other quantum network schemes, it allows quantum keys to be distributed between two arbitrary users with the help of an intermediary detecting user. Moreover, it has good expansibility and prevents all potential attacks using loopholes in a detector, so it is more practical to apply. Because the fiber birefringence effects are automatically compensated, the scheme is distinctly stable in principle and in experiment. The simple components for every user make our scheme easier for many applications. The experimental results demonstrate the stability and feasibility of this scheme. (general)

  10. A General Polygon-based Deformable Model for Object Recognition

    DEFF Research Database (Denmark)

    Jensen, Rune Fisker; Carstensen, Jens Michael

    1999-01-01

    We propose a general scheme for object localization and recognition based on a deformable model. The model combines shape and image properties by warping a arbitrary prototype intensity template according to the deformation in shape. The shape deformations are constrained by a probabilistic distr...

  11. Paradigms in object recognition

    International Nuclear Information System (INIS)

    Mutihac, R.; Mutihac, R.C.

    1999-09-01

    A broad range of approaches has been proposed and applied for the complex and rather difficult task of object recognition that involves the determination of object characteristics and object classification into one of many a priori object types. Our paper revises briefly the three main different paradigms in pattern recognition, namely Bayesian statistics, neural networks, and expert systems. (author)

  12. Infant Visual Recognition Memory

    Science.gov (United States)

    Rose, Susan A.; Feldman, Judith F.; Jankowski, Jeffery J.

    2004-01-01

    Visual recognition memory is a robust form of memory that is evident from early infancy, shows pronounced developmental change, and is influenced by many of the same factors that affect adult memory; it is surprisingly resistant to decay and interference. Infant visual recognition memory shows (a) modest reliability, (b) good discriminant…

  13. Recognition and Toleration

    DEFF Research Database (Denmark)

    Lægaard, Sune

    2010-01-01

    Recognition and toleration are ways of relating to the diversity characteristic of multicultural societies. The article concerns the possible meanings of toleration and recognition, and the conflict that is often claimed to exist between these two approaches to diversity. Different forms or inter...

  14. Fingerprint classification using a simplified rule-set based on directional patterns and singularity features

    CSIR Research Space (South Africa)

    Dorasamy, K

    2015-07-01

    Full Text Available The use of directional patterns has recently received more attention in fingerprint classification. It provides a global representation of a fingerprint, by dividing it into homogeneous orientation partitions. With this technique, the challenge...

  15. Secure fingerprint identification based on structural and microangiographic optical coherence tomography.

    Science.gov (United States)

    Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun

    2017-03-10

    Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.

  16. Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-11-01

    Full Text Available representation they offer. Using an emerging fingerprint acquisition technology – optical coherence tomography – to access an internal fingerprint under the skin surface, this paper serves to address two limitations of conventional scanners: fingertip skin damage...

  17. Distortion analysis on binary representation of minutiae based fingerprint matching for match-on-card

    CSIR Research Space (South Africa)

    Mlambo, CS

    2016-12-01

    Full Text Available The fingerprint matching on the smart card has long been developed and recognized faster method than fingerprint matching on a computer or large capacity systems. There has been much research and activities concerned with improving the accuracy...

  18. Evaluating the change of directional patterns for fingerprints with missing singular points under rotation

    CSIR Research Space (South Africa)

    Dorasamy, Kribashnee

    2016-12-01

    Full Text Available Overcoming small inter-class variation when fingerprints have missing singular points (SPs) is one of the current challenges faced in fingerprint classification, since class information is scarce. Grouping the orientation fields to form Directional...

  19. Wavelet/scalar quantization compression standard for fingerprint images

    Energy Technology Data Exchange (ETDEWEB)

    Brislawn, C.M.

    1996-06-12

    US Federal Bureau of Investigation (FBI) has recently formulated a national standard for digitization and compression of gray-scale fingerprint images. Fingerprints are scanned at a spatial resolution of 500 dots per inch, with 8 bits of gray-scale resolution. The compression algorithm for the resulting digital images is based on adaptive uniform scalar quantization of a discrete wavelet transform subband decomposition (wavelet/scalar quantization method). The FBI standard produces archival-quality images at compression ratios of around 15 to 1 and will allow the current database of paper fingerprint cards to be replaced by digital imagery. The compression standard specifies a class of potential encoders and a universal decoder with sufficient generality to reconstruct compressed images produced by any compliant encoder, allowing flexibility for future improvements in encoder technology. A compliance testing program is also being implemented to ensure high standards of image quality and interchangeability of data between different implementations.

  20. A novel hand-type detection technique with fingerprint sensor

    Science.gov (United States)

    Abe, Narishige; Shinzaki, Takashi

    2013-05-01

    In large-scale biometric authentication systems such as the US-Visit (USA), a 10-fingerprints scanner which simultaneously captures four fingerprints is used. In traditional systems, specific hand-types (left or right) are indicated, but it is difficult to detect hand-type due to the hand rotation and the opening and closing of fingers. In this paper, we evaluated features that were extracted from hand images (which were captured by a general optical scanner) that are considered to be effective for detecting hand-type. Furthermore, we extended the knowledge to real fingerprint images, and evaluated the accuracy with which it detects hand-type. We obtained an accuracy of about 80% with only three fingers (index, middle, ring finger).

  1. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  2. AIR-MRF: Accelerated iterative reconstruction for magnetic resonance fingerprinting.

    Science.gov (United States)

    Cline, Christopher C; Chen, Xiao; Mailhe, Boris; Wang, Qiu; Pfeuffer, Josef; Nittka, Mathias; Griswold, Mark A; Speier, Peter; Nadar, Mariappan S

    2017-09-01

    Existing approaches for reconstruction of multiparametric maps with magnetic resonance fingerprinting (MRF) are currently limited by their estimation accuracy and reconstruction time. We aimed to address these issues with a novel combination of iterative reconstruction, fingerprint compression, additional regularization, and accelerated dictionary search methods. The pipeline described here, accelerated iterative reconstruction for magnetic resonance fingerprinting (AIR-MRF), was evaluated with simulations as well as phantom and in vivo scans. We found that the AIR-MRF pipeline provided reduced parameter estimation errors compared to non-iterative and other iterative methods, particularly at shorter sequence lengths. Accelerated dictionary search methods incorporated into the iterative pipeline reduced the reconstruction time at little cost of quality. Copyright © 2017 Elsevier Inc. All rights reserved.

  3. Beware of the possibility of fingerprinting techniques transferring DNA.

    Science.gov (United States)

    van Oorschot, Roland A H; Treadwell, Sally; Beaurepaire, James; Holding, Nicole L; Mitchell, Robert J

    2005-11-01

    Fingerprinting brushes have the potential to collect and transfer DNA during powdering. Squirrel-hair fingerprint brushes exposed to specific sets of saliva stains and brushes used in routine casework were tested for their ability to collect and transfer DNA containing material using standard DNA extraction procedures and AmpFlSTR Profiler Plus amplification and typing procedures. The tests found that the risk of transferring DNA during powdering and having a detrimental impact on the analysis increases if the examiner powders over either biological stains (such as blood or saliva) or very fresh prints and uses more sensitive PCR amplification and typing procedures. We advocate caution when powdering prints from which DNA may also be collected and provide options for consideration to limit the risk of transferred DNA contamination while fingerprinting.

  4. Challenging ocular image recognition

    Science.gov (United States)

    Pauca, V. Paúl; Forkin, Michael; Xu, Xiao; Plemmons, Robert; Ross, Arun A.

    2011-06-01

    Ocular recognition is a new area of biometric investigation targeted at overcoming the limitations of iris recognition performance in the presence of non-ideal data. There are several advantages for increasing the area beyond the iris, yet there are also key issues that must be addressed such as size of the ocular region, factors affecting performance, and appropriate corpora to study these factors in isolation. In this paper, we explore and identify some of these issues with the goal of better defining parameters for ocular recognition. An empirical study is performed where iris recognition methods are contrasted with texture and point operators on existing iris and face datasets. The experimental results show a dramatic recognition performance gain when additional features are considered in the presence of poor quality iris data, offering strong evidence for extending interest beyond the iris. The experiments also highlight the need for the direct collection of additional ocular imagery.

  5. Enhancement of plant metabolite fingerprinting by machine learning.

    Science.gov (United States)

    Scott, Ian M; Vermeer, Cornelia P; Liakata, Maria; Corol, Delia I; Ward, Jane L; Lin, Wanchang; Johnson, Helen E; Whitehead, Lynne; Kular, Baldeep; Baker, John M; Walsh, Sean; Dave, Anuja; Larson, Tony R; Graham, Ian A; Wang, Trevor L; King, Ross D; Draper, John; Beale, Michael H

    2010-08-01

    Metabolite fingerprinting of Arabidopsis (Arabidopsis thaliana) mutants with known or predicted metabolic lesions was performed by (1)H-nuclear magnetic resonance, Fourier transform infrared, and flow injection electrospray-mass spectrometry. Fingerprinting enabled processing of five times more plants than conventional chromatographic profiling and was competitive for discriminating mutants, other than those affected in only low-abundance metabolites. Despite their rapidity and complexity, fingerprints yielded metabolomic insights (e.g. that effects of single lesions were usually not confined to individual pathways). Among fingerprint techniques, (1)H-nuclear magnetic resonance discriminated the most mutant phenotypes from the wild type and Fourier transform infrared discriminated the fewest. To maximize information from fingerprints, data analysis was crucial. One-third of distinctive phenotypes might have been overlooked had data models been confined to principal component analysis score plots. Among several methods tested, machine learning (ML) algorithms, namely support vector machine or random forest (RF) classifiers, were unsurpassed for phenotype discrimination. Support vector machines were often the best performing classifiers, but RFs yielded some particularly informative measures. First, RFs estimated margins between mutant phenotypes, whose relations could then be visualized by Sammon mapping or hierarchical clustering. Second, RFs provided importance scores for the features within fingerprints that discriminated mutants. These scores correlated with analysis of variance F values (as did Kruskal-Wallis tests, true- and false-positive measures, mutual information, and the Relief feature selection algorithm). ML classifiers, as models trained on one data set to predict another, were ideal for focused metabolomic queries, such as the distinctiveness and consistency of mutant phenotypes. Accessible software for use of ML in plant physiology is highlighted.

  6. Binary similarity measures for fingerprint analysis of qualitative metabolomic profiles.

    Science.gov (United States)

    Rácz, Anita; Andrić, Filip; Bajusz, Dávid; Héberger, Károly

    2018-01-01

    Contemporary metabolomic fingerprinting is based on multiple spectrometric and chromatographic signals, used either alone or combined with structural and chemical information of metabolic markers at the qualitative and semiquantitative level. However, signal shifting, convolution, and matrix effects may compromise metabolomic patterns. Recent increase in the use of qualitative metabolomic data, described by the presence (1) or absence (0) of particular metabolites, demonstrates great potential in the field of metabolomic profiling and fingerprint analysis. The aim of this study is a comprehensive evaluation of binary similarity measures for the elucidation of patterns among samples of different botanical origin and various metabolomic profiles. Nine qualitative metabolomic data sets covering a wide range of natural products and metabolomic profiles were applied to assess 44 binary similarity measures for the fingerprinting of plant extracts and natural products. The measures were analyzed by the novel sum of ranking differences method (SRD), searching for the most promising candidates. Baroni-Urbani-Buser (BUB) and Hawkins-Dotson (HD) similarity coefficients were selected as the best measures by SRD and analysis of variance (ANOVA), while Dice (Di1), Yule, Russel-Rao, and Consonni-Todeschini 3 ranked the worst. ANOVA revealed that concordantly and intermediately symmetric similarity coefficients are better candidates for metabolomic fingerprinting than the asymmetric and correlation based ones. The fingerprint analysis based on the BUB and HD coefficients and qualitative metabolomic data performed equally well as the quantitative metabolomic profile analysis. Fingerprint analysis based on the qualitative metabolomic profiles and binary similarity measures proved to be a reliable way in finding the same/similar patterns in metabolomic data as that extracted from quantitative data.

  7. Analysis of cellular and extracellular DNA in fingerprints

    Energy Technology Data Exchange (ETDEWEB)

    Button, Julie M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-09

    It has been previously shown that DNA can be recovered from latent fingerprints left on various surfaces [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. However, the source of the DNA, extracellular versus cellular origin, is difficult to determine. If the DNA is cellular, it is believed to belong to skin cells while extracellular DNA is believed to originate from body fluids such as sweat [D. J. Daly et. al, Forensic Sci. Int. Genet. 6, 41-46 (2012); V. V. Vlassov et. al, BioEssays 29, 654-667 (2007)]. The origin of the DNA in fingerprints has implications for processing and interpretation of forensic evidence. The determination of the origin of DNA in fingerprints is further complicated by the fact that the DNA in fingerprints tends to be at a very low quantity [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. This study examined fingerprints from five volunteers left on sterilized glass slides and plastic pens. Three fingerprints were left on each glass slide (thumb, index, and middle fingers) while the pens were held as if one was writing with them. The DNA was collected from the objects using the wet swabbing technique (TE buffer). Following collection, the cellular and extracellular components of each sample were separated using centrifugation and an acoustofluidics system. Centrifugation is still the primary separation technique utilized in forensics laboratories, while acoustic focusing uses sound waves to focus large particles (cells) into low pressure nodes, separating them from the rest of the sample matrix. After separation, all samples were quantified using real-time quantitative PCR (qPCR). The overall trend is that there is more DNA in the extracellular fractions than cellular fractions for both centrifugation and acoustofluidic processing. Additionally, more DNA was generally collected from the pen samples than the samples left on glass slides.

  8. Defense of fake fingerprint attacks using a swept source laser optical coherence tomography setup

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  9. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...

  10. LED intense headband light source for fingerprint analysis

    Science.gov (United States)

    Villa-Aleman, Eliel

    2005-03-08

    A portable, lightweight and high-intensity light source for detecting and analyzing fingerprints during field investigation. On-site field analysis requires long hours of mobile analysis. In one embodiment, the present invention comprises a plurality of light emitting diodes; a power source; and a personal attachment means; wherein the light emitting diodes are powered by the power source, and wherein the power source and the light emitting diodes are attached to the personal attachment means to produce a personal light source for on-site analysis of latent fingerprints. The present invention is available for other applications as well.

  11. Fingerprint-based structure retrieval using electron density.

    Science.gov (United States)

    Yin, Shuangye; Dokholyan, Nikolay V

    2011-03-01

    We present a computational approach that can quickly search a large protein structural database to identify structures that fit a given electron density, such as determined by cryo-electron microscopy. We use geometric invariants (fingerprints) constructed using 3D Zernike moments to describe the electron density, and reduce the problem of fitting of the structure to the electron density to simple fingerprint comparison. Using this approach, we are able to screen the entire Protein Data Bank and identify structures that fit two experimental electron densities determined by cryo-electron microscopy. Copyright © 2010 Wiley-Liss, Inc.

  12. Donor-derived metastatic melanoma in a liver transplant recipient established by DNA fingerprinting.

    Science.gov (United States)

    Bilal, Muhammad; Eason, James D; Das, Kanak; Sylvestre, Pamela B; Dean, Amanda G; Vanatta, Jason M

    2013-10-01

    Metastatic melanoma is a donor-derived malignancy that has rarely been reported in liver allograft recipients. We present a case of a transmitted donor-derived melanoma to a liver allograft recipient in whom the diagnosis was established by polymerase chain reaction-based DNA fingerprinting. A 52-year-old African-American man underwent a successful orthotropic liver transplant for alcohol-induced cirrhosis. One year after the orthotropic liver transplant, he presented at our institution with diffuse abdominal pain, and a computed tomography scan of the abdomen and chest showed innumerable masses diffusely involving the liver and multiple subcutaneous nodules in the abdominal and chest wall. A liver biopsy confirmed the diagnosis of metastatic melanoma. The origin of melanoma was traced to the donor by DNA fingerprinting of the native liver, the donor liver, and the donor gallbladder. Chemotherapy was initiated with temozolomide (75 mg/m² daily) and thalidomide (50 mg daily), to which he responded within 8 weeks with radiologic improvement in metastatic lesions. Tacrolimus was switched to sirolimus because of renal insufficiency as well as reported effectiveness against melanoma. Our patient survived for 9 months after the diagnosis of metastatic melanoma. He ultimately died of brain metastases. Donor-derived metastatic melanoma is a rare cancer with the highest transmission and mortality rates, which requires better recognition. Prompt diagnosis of donor-derived melanoma is critical and can be achieved reliably with polymerase chain reaction-based DNA analysis. Management options after diagnosis include de-escalation of immunosuppression, with or without urgent organ removal or retransplant. The roles of chemotherapy, immunotherapy, and radiotherapy require further study.

  13. Towards a complete rule-based classification approach for flat fingerprints

    CSIR Research Space (South Africa)

    Webb, L

    2014-12-01

    Full Text Available fingerprints. This work implements an algorithm which includes new rules to account for more instances of flat fingerprints with missing singular points, specifically when the delta of a Right Loop or Left Loop fingerprint is not captured, when one of the loops...

  14. Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Munk, Carsten Valdemar

    2008-01-01

    records fingerprints as signal-strength ratios between pairs of base stations instead of absolute signal-strength values. The proposed solution has been evaluated by extending two well-known location fingerprinting techniques to hyperbolic location fingerprinting. The extended techniques have been tested...

  15. Novel fingerprint re-alignment solution that uses the TFCP as a reference

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-08-01

    Full Text Available , independent, and efficient for all types of fingerprints. It, in particular, is useful when dealing with the type of fingerprints that belong to the Plain Arch (PA) fingerprint class. The credibility of this proposed solution is interrogated through its...

  16. Performance analysis of a hybrid fingerprint extracted from optical coherence tomography fingertip scans

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-06-01

    Full Text Available The Hybrid fingerprint is a local-quality-specific blend of the surface and internal fingerprints, extracted from optical coherence tomography scans. Owing to its origin, and the manner in which it is obtained, the Hybrid fingerprint is a high...

  17. Complexity and distortion analysis on methods for unrolling 3D to 2D fingerprints

    CSIR Research Space (South Africa)

    Mlambo, CS

    2015-11-01

    Full Text Available and studies involve the application of three-dimensional (3D) fingerprint systems, where the details of the finger are captured using 3D technologies and the captured 3D fingerprints are converted into two-dimensional (2D) fingerprints. This paper presents a...

  18. Comparison of Powder Dusting and Cyanoacrylate Fuming Techniques in Retrieving Latent Fingerprint Exposed to Environment Conditions

    International Nuclear Information System (INIS)

    Mayalvanan, Y.; Sri Pawita Albakri Amir Hamzah; Chuan, L.L.; Muhamad Hilmi Baba; Amidon Anan

    2014-01-01

    Latent fingerprints are one of the best evidence to prove the presence of an individuals presence at the crime scene. There are many techniques available for a successful fingerprint lifting. Two of the most common ones are fingerprint powder dusting and cyanoacrylate fuming. This research aims to compare both techniques and determine which has a higher success rate in retrieving fingerprints exposed to local environmental conditions for three days. Fingerprint samples were collected from 18 subjects on glass, perspex and aluminium slides. These samples were then exposed to local environmental conditions for three days. The fingerprints were then developed using the aforementioned techniques. Based on the results, it can be safely said that, fuming results in clearer fingerprints and more minutiae can be found from the retrieved fingerprints even with exposure to less than optimum local conditions. This proves that fuming is a better fingerprint lifting method to resolve latent fingerprint compared to powder dusting. Surface on which the fingerprint is retrieved from influences the quality of clarity of a latent fingerprint. (author)

  19. Iris Recognition Using Feature Extraction of Box Counting Fractal Dimension

    Science.gov (United States)

    Khotimah, C.; Juniati, D.

    2018-01-01

    Biometrics is a science that is now growing rapidly. Iris recognition is a biometric modality which captures a photo of the eye pattern. The markings of the iris are distinctive that it has been proposed to use as a means of identification, instead of fingerprints. Iris recognition was chosen for identification in this research because every human has a special feature that each individual is different and the iris is protected by the cornea so that it will have a fixed shape. This iris recognition consists of three step: pre-processing of data, feature extraction, and feature matching. Hough transformation is used in the process of pre-processing to locate the iris area and Daugman’s rubber sheet model to normalize the iris data set into rectangular blocks. To find the characteristics of the iris, it was used box counting method to get the fractal dimension value of the iris. Tests carried out by used k-fold cross method with k = 5. In each test used 10 different grade K of K-Nearest Neighbor (KNN). The result of iris recognition was obtained with the best accuracy was 92,63 % for K = 3 value on K-Nearest Neighbor (KNN) method.

  20. Modified Aggressive Packet Combining Scheme

    International Nuclear Information System (INIS)

    Bhunia, C.T.

    2010-06-01

    In this letter, a few schemes are presented to improve the performance of aggressive packet combining scheme (APC). To combat error in computer/data communication networks, ARQ (Automatic Repeat Request) techniques are used. Several modifications to improve the performance of ARQ are suggested by recent research and are found in literature. The important modifications are majority packet combining scheme (MjPC proposed by Wicker), packet combining scheme (PC proposed by Chakraborty), modified packet combining scheme (MPC proposed by Bhunia), and packet reversed packet combining (PRPC proposed by Bhunia) scheme. These modifications are appropriate for improving throughput of conventional ARQ protocols. Leung proposed an idea of APC for error control in wireless networks with the basic objective of error control in uplink wireless data network. We suggest a few modifications of APC to improve its performance in terms of higher throughput, lower delay and higher error correction capability. (author)

  1. Transmission usage cost allocation schemes

    International Nuclear Information System (INIS)

    Abou El Ela, A.A.; El-Sehiemy, R.A.

    2009-01-01

    This paper presents different suggested transmission usage cost allocation (TCA) schemes to the system individuals. Different independent system operator (ISO) visions are presented using the proportional rata and flow-based TCA methods. There are two proposed flow-based TCA schemes (FTCA). The first FTCA scheme generalizes the equivalent bilateral exchanges (EBE) concepts for lossy networks through two-stage procedure. The second FTCA scheme is based on the modified sensitivity factors (MSF). These factors are developed from the actual measurements of power flows in transmission lines and the power injections at different buses. The proposed schemes exhibit desirable apportioning properties and are easy to implement and understand. Case studies for different loading conditions are carried out to show the capability of the proposed schemes for solving the TCA problem. (author)

  2. 8 CFR 292.2 - Organizations qualified for recognition; requests for recognition; withdrawal of recognition...

    Science.gov (United States)

    2010-01-01

    ...; requests for recognition; withdrawal of recognition; accreditation of representatives; roster. 292.2...; withdrawal of recognition; accreditation of representatives; roster. (a) Qualifications of organizations. A non-profit religious, charitable, social service, or similar organization established in the United...

  3. BSSF: a fingerprint based ultrafast binding site similarity search and function analysis server

    Directory of Open Access Journals (Sweden)

    Jiang Hualiang

    2010-01-01

    Full Text Available Abstract Background Genome sequencing and post-genomics projects such as structural genomics are extending the frontier of the study of sequence-structure-function relationship of genes and their products. Although many sequence/structure-based methods have been devised with the aim of deciphering this delicate relationship, there still remain large gaps in this fundamental problem, which continuously drives researchers to develop novel methods to extract relevant information from sequences and structures and to infer the functions of newly identified genes by genomics technology. Results Here we present an ultrafast method, named BSSF(Binding Site Similarity & Function, which enables researchers to conduct similarity searches in a comprehensive three-dimensional binding site database extracted from PDB structures. This method utilizes a fingerprint representation of the binding site and a validated statistical Z-score function scheme to judge the similarity between the query and database items, even if their similarities are only constrained in a sub-pocket. This fingerprint based similarity measurement was also validated on a known binding site dataset by comparing with geometric hashing, which is a standard 3D similarity method. The comparison clearly demonstrated the utility of this ultrafast method. After conducting the database searching, the hit list is further analyzed to provide basic statistical information about the occurrences of Gene Ontology terms and Enzyme Commission numbers, which may benefit researchers by helping them to design further experiments to study the query proteins. Conclusions This ultrafast web-based system will not only help researchers interested in drug design and structural genomics to identify similar binding sites, but also assist them by providing further analysis of hit list from database searching.

  4. Password Authentication Based on Fractal Coding Scheme

    Directory of Open Access Journals (Sweden)

    Nadia M. G. Al-Saidi

    2012-01-01

    Full Text Available Password authentication is a mechanism used to authenticate user identity over insecure communication channel. In this paper, a new method to improve the security of password authentication is proposed. It is based on the compression capability of the fractal image coding to provide an authorized user a secure access to registration and login process. In the proposed scheme, a hashed password string is generated and encrypted to be captured together with the user identity using text to image mechanisms. The advantage of fractal image coding is to be used to securely send the compressed image data through a nonsecured communication channel to the server. The verification of client information with the database system is achieved in the server to authenticate the legal user. The encrypted hashed password in the decoded fractal image is recognized using optical character recognition. The authentication process is performed after a successful verification of the client identity by comparing the decrypted hashed password with those which was stored in the database system. The system is analyzed and discussed from the attacker’s viewpoint. A security comparison is performed to show that the proposed scheme provides an essential security requirement, while their efficiency makes it easier to be applied alone or in hybrid with other security methods. Computer simulation and statistical analysis are presented.

  5. Typing of Mycoplasma pneumoniae by PCR-mediated DNA fingerprinting

    NARCIS (Netherlands)

    Ursi, D; Ieven, M; van Bever, H; Quint, W; Niesters, H G; Goossens, H

    PCR fingerprinting was used to characterize clinical isolates of Mycoplasma pneumoniae. Among 24 strains tested, two types were distinguished. Nineteen strains belonged to type 1, whereas only 5 strains belonged to type 2. The majority of strains isolated since 1991 in Belgium belong to type 1. No

  6. [HPTLC fingerprint analysis of andrographolides from Andrographis paniculata].

    Science.gov (United States)

    Shao, Yan-Hua; Wang, Jian-Gang; Lai, Xiao-Ping; Wu, Xiang-Wei; Ding, Ping

    2014-02-01

    To establish the high-performance thin layer chromatography (HPTLC) fingerprint of andrographolides from Andrographis paniculata, and to valuate the fingerprint similarity of samples from different habitats, markets, used parts and so on. Chromatographic conditions were as follows: stationary phase: precoated HPTLC GF254 silica-gel plate (20 cm x 10 cm); developing solvent system: chloroform-toluene-methanol (80:10:15); Relative humidity: 42%; Color development reagent: 5% H2SO4 ethanolic solution, heating at 105 degrees C and observing the fluorescent chromatogram in a UV cabinet at 366 nm. The common patterns of HPTLC fingerprint were obtained through CHROMAP 1.5 solution software. The HPTLC fingerprint of andrographolides was consisted of 9 characteristic peaks (fluorescent bands) including andrographolide, neoandrographolide and dehydroandrographolide which were chemical reference substances. The investigation and analysis of 51 batches of Andrographis paniculata showed that there were remarkable differences among different samples, so was the content of andrographolide and total lactones. This method is simple and rapid, which can serve as an effective identification and quality assessment method for Andrographis paniculata.

  7. Pemanfaatan Biometric Fingerprint sebagai Media Pembayaran Transjakarta Berbasis Electronic Money

    OpenAIRE

    Muhajir, Ahmad; Ristiyanti, Lia; Harsono, Shabrina Utami

    2017-01-01

    Penelitian ini bertujuan untuk mengetahui pemanfaatan lain dari sidik jari sebagaialternative media pembayaran berbasis uang elektronik pada Transjakarta. Penggunaan sidik jaridipilih karena sidik jari merupakan identitas manusia yang tidak dapat diganti atau dirubah. Padapenelitian ini menggunakan Deskriptif Studies karena bertujuan untuk memberikan gambaransecara sistematis dan akurat mengenai Pemanfaatan Biometric Fingerprint sebagai mediapemabayaran Transjakarta berbasis E-Money. Dalam me...

  8. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  9. Generating One Biometric Feature from Another: Faces from Fingerprints

    Directory of Open Access Journals (Sweden)

    Seref Sagiroglu

    2010-04-01

    Full Text Available This study presents a new approach based on artificial neural networks for generating one biometric feature (faces from another (only fingerprints. An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  10. Image-based fingerprint verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil K. Singla

    2008-09-01

    Full Text Available Biometric-based identification/verification systems provide a solution to the security concerns in the modern world where machine is replacing human in every aspect of life. Fingerprints, because of their uniqueness, are the most widely used and highly accepted biometrics. Fingerprint biometric systems are either minutiae-based or pattern learning (image based. The minutiae-based algorithm depends upon the local discontinuities in the ridge flow pattern and are used when template size is important while image-based matching algorithm uses both the micro and macro feature of a fingerprint and is used if fast response is required. In the present paper an image-based fingerprint verification system is discussed. The proposed method uses a learning phase, which is not present in conventional image-based systems. The learning phase uses pseudo random sub-sampling, which reduces the number of comparisons needed in the matching stage. This system has been developed using LabVIEW (Laboratory Virtual Instrument Engineering Workbench toolbox version 6i. The availability of datalog files in LabVIEW makes it one of the most promising candidates for its usage as a database. Datalog files can access and manipulate data and complex data structures quickly and easily. It makes writing and reading much faster. After extensive experimentation involving a large number of samples and different learning sizes, high accuracy with learning image size of 100 100 and a threshold value of 700 (1000 being the perfect match has been achieved.

  11. Bayesian estimation of multicomponent relaxation parameters in magnetic resonance fingerprinting.

    Science.gov (United States)

    McGivney, Debra; Deshmane, Anagha; Jiang, Yun; Ma, Dan; Badve, Chaitra; Sloan, Andrew; Gulani, Vikas; Griswold, Mark

    2018-07-01

    To estimate multiple components within a single voxel in magnetic resonance fingerprinting when the number and types of tissues comprising the voxel are not known a priori. Multiple tissue components within a single voxel are potentially separable with magnetic resonance fingerprinting as a result of differences in signal evolutions of each component. The Bayesian framework for inverse problems provides a natural and flexible setting for solving this problem when the tissue composition per voxel is unknown. Assuming that only a few entries from the dictionary contribute to a mixed signal, sparsity-promoting priors can be placed upon the solution. An iterative algorithm is applied to compute the maximum a posteriori estimator of the posterior probability density to determine the magnetic resonance fingerprinting dictionary entries that contribute most significantly to mixed or pure voxels. Simulation results show that the algorithm is robust in finding the component tissues of mixed voxels. Preliminary in vivo data confirm this result, and show good agreement in voxels containing pure tissue. The Bayesian framework and algorithm shown provide accurate solutions for the partial-volume problem in magnetic resonance fingerprinting. The flexibility of the method will allow further study into different priors and hyperpriors that can be applied in the model. Magn Reson Med 80:159-170, 2018. © 2017 International Society for Magnetic Resonance in Medicine. © 2017 International Society for Magnetic Resonance in Medicine.

  12. A preliminary study of DTI Fingerprinting on stroke analysis.

    Science.gov (United States)

    Ma, Heather T; Ye, Chenfei; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo

    2014-01-01

    DTI (Diffusion Tensor Imaging) is a well-known MRI (Magnetic Resonance Imaging) technique which provides useful structural information about human brain. However, the quantitative measurement to physiological variation of subtypes of ischemic stroke is not available. An automatically quantitative method for DTI analysis will enhance the DTI application in clinics. In this study, we proposed a DTI Fingerprinting technology to quantitatively analyze white matter tissue, which was applied in stroke classification. The TBSS (Tract Based Spatial Statistics) method was employed to generate mask automatically. To evaluate the clustering performance of the automatic method, lesion ROI (Region of Interest) is manually drawn on the DWI images as a reference. The results from the DTI Fingerprinting were compared with those obtained from the reference ROIs. It indicates that the DTI Fingerprinting could identify different states of ischemic stroke and has promising potential to provide a more comprehensive measure of the DTI data. Further development should be carried out to improve DTI Fingerprinting technology in clinics.

  13. Typing of Mycoplasma pneumoniae by PCR-mediated DNA fingerprinting

    NARCIS (Netherlands)

    Ursi, D; Ieven, M; van Bever, H; Quint, W; Niesters, H G; Goossens, H

    1994-01-01

    PCR fingerprinting was used to characterize clinical isolates of Mycoplasma pneumoniae. Among 24 strains tested, two types were distinguished. Nineteen strains belonged to type 1, whereas only 5 strains belonged to type 2. The majority of strains isolated since 1991 in Belgium belong to type 1. No

  14. Molecular fingerprinting of the Egyptian medicinal plant Cocculus ...

    African Journals Online (AJOL)

    Since no information about the genome of C. pendulus is available, the current study deals with molecular investigation of C. pendulus expressed by DNA fingerprinting of the young leaves of this plant using amplified fragment length polymorphism (AFLP) technique with four primer combinations. The obtained results ...

  15. 8 CFR 1240.38 - Fingerprinting of excluded aliens.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprinting of excluded aliens. 1240.38 Section 1240.38 Aliens and Nationality EXECUTIVE OFFICE FOR IMMIGRATION REVIEW, DEPARTMENT OF JUSTICE IMMIGRATION REGULATIONS PROCEEDINGS TO DETERMINE REMOVABILITY OF ALIENS IN THE UNITED STATES Exclusion of...

  16. Combining smart lighting and radio fingerprinting for improved indoor localization

    NARCIS (Netherlands)

    Kanaris, Loizos; Kokkinis, Akis; Liotta, Antonio; Stavrou, Stavros

    2017-01-01

    This work proposes a hybrid indoor positioning system, which combines a minimal smart lighting deployment for Visible Light Positioning (VPL) purposes, with an IEEE 802.11 RSS Fingerprint-based Indoor Positioning System. Such a hybrid deployment improves the localization performance by utilizing the

  17. On the feasibility of device fingerprinting in industrial control systems

    NARCIS (Netherlands)

    Caselli, M.; Hadziosmanovic, D.; Zambon, Emmanuele; Kargl, Frank; Luiijf, Eric; Hartel, Pieter H.

    2013-01-01

    As Industrial Control Systems (ICS) and standard IT networks are becoming one heterogeneous entity, there has been an increasing effort in adjusting common security tools and methodologies to fit the industrial environment. Fingerprinting of industrial devices is still an unexplored research field.

  18. An investigation of face and fingerprint feature-fusion guidelines

    CSIR Research Space (South Africa)

    Brown, Dane

    2016-05-01

    Full Text Available There are a lack of multi-modal biometric fusion guidelines at the feature-level. This paper investigates face and fingerprint features in the form of their strengths and weaknesses. This serves as a set of guidelines to authors that are planning...

  19. Detection of cores in fingerprints with improved dimension reduction

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    In this paper, we present a statistical approach to core detection in fingerprint images that is based on the likelihood ratio, using models of variation of core templates and randomly chosen templates. Additionally, we propose an alternative dimension reduction method. Unlike standard linear

  20. Cleaning and Processing RSS measurements for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun

    2007-01-01

    Handling variations in sampled Received Signal Strength (RSS) is neassary for achieving robust location fingerprinting (LF). Current research has only proposed limited system-specific models for how to handle the cleaning of RSS variations. However, this paper propose a novel model for both...

  1. cultivars and identification of genotype-specific fingerprints using ...

    Indian Academy of Sciences (India)

    Home; Journals; Journal of Genetics; Volume 89; Online resources. Diversity in Indian barley (Hordeum vulgare) cultivars and identification of genotype-specific fingerprints using microsatellite markers. S. K. Jaiswal Shree P. Pandey S. Sharma R. Prasad L. C. Prasad R. P. S. Verma Arun K. Joshi. Volume 89 Online ...

  2. Development and Validation of Improved Method for Fingerprint ...

    African Journals Online (AJOL)

    Purpose: To develop and validate an improved method by capillary zone electrophoresis with photodiode array detection for the fingerprint analysis of Ligusticum chuanxiong Hort. (Rhizoma Chuanxiong). Methods: The optimum high performance capillary electrophoresis (HPCE) conditions were 30 mM borax containing 5 ...

  3. Chemical fingerprint technique and its application in the ...

    African Journals Online (AJOL)

    The Gastrodia tuber and its active component, gastrodin, have many pharmacological effects. In this study, optimized high performance liquid chromatography (HPLC) parameters were employed to determine the chemical fingerprints and gastrodin content of nine Gastrodia tuber populations. Based on the degree of ...

  4. Atomistic fingerprint of hyaluronan-CD44 binding

    DEFF Research Database (Denmark)

    Vuorio, Joni; Vattulainen, Ilpo; Martinez-Seara, Hector

    2017-01-01

    that hyaluronan can bind CD44 with three topographically different binding modes that in unison define an interaction fingerprint, thus providing a plausible explanation for the disagreement between the earlier studies. Our results confirm that the known crystallographic mode is the strongest of the three binding...

  5. Serum protein fingerprint of patients with gastric cancer by SELDI ...

    African Journals Online (AJOL)

    To study the serum protein fingerprint of patients with gastric cancer and to screen for protein molecules closely related to gastric cancer during the onset and progression of the disease using surface-enhanced laser desorption and ionization time-of-flight mass spectrometry (SELDI-TOF-MS). Serum samples from 80 gastric ...

  6. Isozyme-based genetic fingerprinting of Manihot sp

    African Journals Online (AJOL)

    Prof. Ogunji

    1973-06-22

    Jun 22, 1973 ... Isozyme-based genetic fingerprinting of Manihot sp. Efisue, A. A.. Development of Crop & Soil Science, University of Port Harcourt P.M.B. 5323 Choba, Port Harcourt,. Rivers State, Nigeria. (Received 29:10:13, Accepted 20:12:13). Abstract. Many cassava varieties have been released into farmers' fields in ...

  7. Verification of Organic Feed Identity by Fatty Acid Fingerprinting

    NARCIS (Netherlands)

    Tres, A.; Ruth, van S.M.

    2011-01-01

    The origin and authenticity of feed for laying hens is an important and fraud-susceptible aspect in the production of organic eggs. Chemical fingerprinting in combination with chemometric methods is increasingly used in conjunction with administrative controls to verify and safeguard the

  8. DNA fingerprinting based on simple sequence repeat (SSR ...

    African Journals Online (AJOL)

    New varieties of sugarcane are protected using morphological descriptors, which have limitations in identifying morphologically similar cultivars. Development of a reliable DNA fingerprint system for identification of new varieties would contribute greatly to the breeding of these species. Microsatellite markers are tools with ...

  9. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Science.gov (United States)

    Chen, C. H. Winston; Tang, Kai; Taranenko, N. I.; Allman, S. L.; Ch'ang, L. Y.

    1994-10-01

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual's DNA structure is identical within all tissues oftheir body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et aL2 found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. Take the Huntington gene as an example, there are CAG trinucleotide repeats. For normal people, the number of CAG repeats is usually between 10 and 40. Since people have chromosomes in pairs, the possibility oftwo individuals having the same VNTR in the Huntington gene is less than one percent, ifwe assume equal distribution for various repeats. When several allels containing VNTR are analyzed for the number of repeats, the possibility of two individuals being exactly identical becomes very unlikely. Thus, DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endornuclease sites can provide the basis for identification.

  10. PCR-DGGE fingerprints of microbial successional changes during ...

    African Journals Online (AJOL)

    PCR-DGGE fingerprints of microbial successional changes during fermentation of cereal-legume weaning foods. ... African Journal of Biotechnology ... Phenotypic identification and monitoring of the dynamics of naturally occurring microbial community responsible for the spontaneous fermentation of different cereal-legume ...

  11. 78 FR 33436 - 2013 Final Fee Rate and Fingerprint Fees

    Science.gov (United States)

    2013-06-04

    ... DEPARTMENT OF THE INTERIOR National Indian Gaming Commission 2013 Final Fee Rate and Fingerprint Fees AGENCY: National Indian Gaming Commission, Interior. ACTION: Notice. SUMMARY: Notice is hereby... annual fee rates of 0.00% for tier 1 and 0.072% (.00072) for tier 2. These rates shall apply to all...

  12. Minutia-pair spectral representations for fingerprint template protection

    NARCIS (Netherlands)

    Stanko, T.; Skoric, B.

    2017-01-01

    We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the

  13. Generating One Biometric Feature from Another: Faces from Fingerprints

    Science.gov (United States)

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  14. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  15. Fingerprint motifs of phytases | Fan | African Journal of Biotechnology

    African Journals Online (AJOL)

    Among the total of potential 173 phytases gained in 11 plant genomes through MAST, PAPhys are the major phytases, and HAPhys are the minor, and other phytase groups are not found in planta. Keywords: Phytase, fingerprint motif, multiple EM for motif elicitation (MEME), MAST African Journal of Biotechnology Vol.

  16. Chemical fingerprinting of petroleum biomakers using time warping and PCA

    DEFF Research Database (Denmark)

    Christensen, Jan H.; Tomasi, Giorgio; Hansen, Asger B.

    2005-01-01

    A new method for chemical fingerprinting of petroleum biomakers is described. The method consists of GC-MS analysis, preprocessing of GC-MS chromatograms, and principal component analysis (PCA) of selected regions. The preprocessing consists of baseline removal by derivatization, normalization...

  17. SSR marker based DNA fingerprinting and diversity study in rice ...

    African Journals Online (AJOL)

    The genetic diversity and DNA fingerprinting of 15 elite rice genotypes using 30 SSR primers on chromosome numbers 7-12 was investigated. The results revealed that all the primers showed distinct polymorphism among the cultivars studied indicating the robust nature of microsatellites in revealing polymorphism. Cluster ...

  18. Harmonization versus Mutual Recognition

    DEFF Research Database (Denmark)

    Jørgensen, Jan Guldager; Schröder, Philipp

    The present paper examines trade liberalization driven by the coordination of product standards. For oligopolistic firms situated in separate markets that are initially sheltered by national standards, mutual recognition of standards implies entry and reduced profits at home paired with the oppor......The present paper examines trade liberalization driven by the coordination of product standards. For oligopolistic firms situated in separate markets that are initially sheltered by national standards, mutual recognition of standards implies entry and reduced profits at home paired...... countries and three firms, where firms first lobby for the policy coordination regime (harmonization versus mutual recognition), and subsequently, in case of harmonization, the global standard is auctioned among the firms. We discuss welfare effects and conclude with policy implications. In particular......, harmonized standards may fail to harvest the full pro-competitive effects from trade liberalization compared to mutual recognition; moreover, the issue is most pronounced in markets featuring price competition....

  19. CASE Recognition Awards.

    Science.gov (United States)

    Currents, 1985

    1985-01-01

    A total of 294 schools, colleges, and universities received prizes in this year's CASE Recognition program. Awards were given in: public relations programs, student recruitment, marketing, program pulications, news writing, fund raising, radio programming, school periodicals, etc. (MLW)

  20. Forensic speaker recognition

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    The aim of forensic speaker recognition is to establish links between individuals and criminal activities, through audio speech recordings. This field is multidisciplinary, combining predominantly phonetics, linguistics, speech signal processing, and forensic statistics. On these bases, expert-based

  1. The Recognition Of Fatigue

    DEFF Research Database (Denmark)

    Elsass, Peter; Jensen, Bodil; Mørup, Rikke

    2007-01-01

    Elsass P., Jensen B., Morup R., Thogersen M.H. (2007). The Recognition Of Fatigue: A qualitative study of life-stories from rehabilitation clients. International Journal of Psychosocial Rehabilitation. 11 (2), 75-87......Elsass P., Jensen B., Morup R., Thogersen M.H. (2007). The Recognition Of Fatigue: A qualitative study of life-stories from rehabilitation clients. International Journal of Psychosocial Rehabilitation. 11 (2), 75-87...

  2. Evaluating music emotion recognition

    DEFF Research Database (Denmark)

    Sturm, Bob L.

    2013-01-01

    A fundamental problem with nearly all work in music genre recognition (MGR)is that evaluation lacks validity with respect to the principal goals of MGR. This problem also occurs in the evaluation of music emotion recognition (MER). Standard approaches to evaluation, though easy to implement, do...... not reliably differentiate between recognizing genre or emotion from music, or by virtue of confounding factors in signals (e.g., equalization). We demonstrate such problems for evaluating an MER system, and conclude with recommendations....

  3. Monozygotic twin pairs discordant for Hashimoto's thyroiditis share a high proportion of thyroid peroxidase autoantibodies to the immunodominant region A. Further evidence for genetic transmission of epitopic "fingerprints"

    DEFF Research Database (Denmark)

    Brix, Thomas Heiberg; Hegedüs, Laszlo; Gardas, Andrzej

    2011-01-01

    Thyroid peroxidase antibodies (TPOAbs) in patients with Hashimoto's thyroiditis (HT) predominantly react with two immunodominant regions (IDR-A, IDR-B). Theoretically, as shown for the level of TPOAbs, the autoantibody epitopic recognition of the IDRs could be under genetic control. To examine this......, we compared the distribution of TPOAb epitopic fingerprints between healthy monozygotic (MZ) co-twins and siblings to patients with clinically overt HT with a control group of euthyroid subjects, matched for sex and age, but without autoimmune thyroid disease (AITD) among their first-degree relatives...

  4. An application of viola jones method for face recognition for absence process efficiency

    Science.gov (United States)

    Rizki Damanik, Rudolfo; Sitanggang, Delima; Pasaribu, Hendra; Siagian, Hendrik; Gulo, Frisman

    2018-04-01

    Absence was a list of documents that the company used to record the attendance time of each employee. The most common problem in a fingerprint machine is the identification of a slow sensor or a sensor not recognizing a finger. The employees late to work because they get difficulties at fingerprint system, they need about 3 – 5 minutes to absence when the condition of finger is wet or not fit. To overcome this problem, this research tried to utilize facial recognition for attendance process. The method used for facial recognition was Viola Jones. Through the processing phase of the RGB face image was converted into a histogram equalization face image for the next stage of recognition. The result of this research was the absence process could be done less than 1 second with a maximum slope of ± 700 and a distance of 20-200 cm. After implement facial recognition the process of absence is more efficient, just take less 1 minute to absence.

  5. Why recognition is rational

    Directory of Open Access Journals (Sweden)

    Clintin P. Davis-Stober

    2010-07-01

    Full Text Available The Recognition Heuristic (Gigerenzer and Goldstein, 1996; Goldstein and Gigerenzer, 2002 makes the counter-intuitive prediction that a decision maker utilizing less information may do as well as, or outperform, an idealized decision maker utilizing more information. We lay a theoretical foundation for the use of single-variable heuristics such as the Recognition Heuristic as an optimal decision strategy within a linear modeling framework. We identify conditions under which over-weighting a single predictor is a mini-max strategy among a class of a priori chosen weights based on decision heuristics with respect to a measure of statistical lack of fit we call ``risk''. These strategies, in turn, outperform standard multiple regression as long as the amount of data available is limited. We also show that, under related conditions, weighting only one variable and ignoring all others produces the same risk as ignoring the single variable and weighting all others. This approach has the advantage of generalizing beyond the original environment of the Recognition Heuristic to situations with more than two choice options, binary or continuous representations of recognition, and to other single variable heuristics. We analyze the structure of data used in some prior recognition tasks and find that it matches the sufficient conditions for optimality in our results. Rather than being a poor or adequate substitute for a compensatory model, the Recognition Heuristic closely approximates an optimal strategy when a decision maker has finite data about the world.

  6. Flow cytometric fingerprinting for microbial strain discrimination and physiological characterization.

    Science.gov (United States)

    Buysschaert, Benjamin; Kerckhof, Frederiek-Maarten; Vandamme, Peter; De Baets, Bernard; Boon, Nico

    2018-02-01

    The analysis of microbial populations is fundamental, not only for developing a deeper understanding of microbial communities but also for their engineering in biotechnological applications. Many methods have been developed to study their characteristics and over the last few decades, molecular analysis tools, such as DNA sequencing, have been used with considerable success to identify the composition of microbial populations. Recently, flow cytometric fingerprinting is emerging as a promising and powerful method to analyze bacterial populations. So far, these methods have primarily been used to observe shifts in the composition of microbial communities of natural samples. In this article, we apply a flow cytometric fingerprinting method to discriminate among 29 Lactobacillus strains. Our results indicate that it is possible to discriminate among 27 Lactobacillus strains by staining with SYBR green I and that the discriminatory power can be increased by combined SYBR green I and propidium iodide staining. Furthermore, we illustrate the impact of physiological changes on the fingerprinting method by demonstrating how flow cytometric fingerprinting is able to discriminate the different growth phases of a microbial culture. The sensitivity of the method is assessed by its ability to detect changes in the relative abundance of a mix of polystyrene beads down to 1.2%. When a mix of bacteria was used, the sensitivity was as between 1.2% and 5%. The presented data demonstrate that flow cytometric fingerprinting is a sensitive and reproducible technique with the potential to be applied as a method for the dereplication of bacterial isolates. © 2017 International Society for Advancement of Cytometry. © 2017 International Society for Advancement of Cytometry.

  7. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  8. Carotenoids Database: structures, chemical fingerprints and distribution among organisms.

    Science.gov (United States)

    Yabuzaki, Junko

    2017-01-01

    To promote understanding of how organisms are related via carotenoids, either evolutionarily or symbiotically, or in food chains through natural histories, we built the Carotenoids Database. This provides chemical information on 1117 natural carotenoids with 683 source organisms. For extracting organisms closely related through the biosynthesis of carotenoids, we offer a new similarity search system 'Search similar carotenoids' using our original chemical fingerprint 'Carotenoid DB Chemical Fingerprints'. These Carotenoid DB Chemical Fingerprints describe the chemical substructure and the modification details based upon International Union of Pure and Applied Chemistry (IUPAC) semi-systematic names of the carotenoids. The fingerprints also allow (i) easier prediction of six biological functions of carotenoids: provitamin A, membrane stabilizers, odorous substances, allelochemicals, antiproliferative activity and reverse MDR activity against cancer cells, (ii) easier classification of carotenoid structures, (iii) partial and exact structure searching and (iv) easier extraction of structural isomers and stereoisomers. We believe this to be the first attempt to establish fingerprints using the IUPAC semi-systematic names. For extracting close profiled organisms, we provide a new tool 'Search similar profiled organisms'. Our current statistics show some insights into natural history: carotenoids seem to have been spread largely by bacteria, as they produce C30, C40, C45 and C50 carotenoids, with the widest range of end groups, and they share a small portion of C40 carotenoids with eukaryotes. Archaea share an even smaller portion with eukaryotes. Eukaryotes then have evolved a considerable variety of C40 carotenoids. Considering carotenoids, eukaryotes seem more closely related to bacteria than to archaea aside from 16S rRNA lineage analysis. : http://carotenoiddb.jp. © The Author(s) 2017. Published by Oxford University Press.

  9. Generation of DNA profiles from fingerprints developed with columnar thin film technique.

    Science.gov (United States)

    Plazibat, Stephanie L; Roy, Reena; Swiontek, Stephen E; Lakhtakia, Akhlesh

    2015-12-01

    Partial-bloody fingerprints and partial fingerprints with saliva are often encountered at crime scenes, potentially enabling the combination of fingerprint and DNA analyses for absolute identification, provided that the development technique for fingerprint analysis does not inhibit DNA analysis. 36 partial-bloody fingerprints and 30 fingerprints wetted with saliva, all deposited on brass, were first developed using the columnar-thin-film (CTF) technique and then subjected to short tandem repeat (STR) DNA analysis. Equal numbers of samples were subjected to the same DNA analysis without development. Tris (8-hydroxyquinolinato) aluminum, or Alq3, was evaporated to deposit CTFs for development of the prints. DNA was extracted from all 132 samples, quantified, and amplified with AmpFlSTR(®) Identifiler Plus Amplification Kit. Additionally, DNA analyses were conducted on four blood smears on un-fingerprinted brass that had been subjected to CTF deposition and four blood smears on un-fingerprinted brass that had not been subjected to CTF deposition. Complete and concordant autosomal STR profiles of the same quality were obtained from both undeveloped and CTF-developed fingerprints, indicating that CTF development of fingerprints preserves DNA and does not inhibit subsequent DNA analysis. Even when there were no fingerprints, CTF deposition did not lead to inhibition of DNA analysis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Snake Model Based on Improved Genetic Algorithm in Fingerprint Image Segmentation

    Directory of Open Access Journals (Sweden)

    Mingying Zhang

    2016-12-01

    Full Text Available Automatic fingerprint identification technology is a quite mature research field in biometric identification technology. As the preprocessing step in fingerprint identification, fingerprint segmentation can improve the accuracy of fingerprint feature extraction, and also reduce the time of fingerprint preprocessing, which has a great significance in improving the performance of the whole system. Based on the analysis of the commonly used methods of fingerprint segmentation, the existing segmentation algorithm is improved in this paper. The snake model is used to segment the fingerprint image. Additionally, it is improved by using the global optimization of the improved genetic algorithm. Experimental results show that the algorithm has obvious advantages both in the speed of image segmentation and in the segmentation effect.

  11. Coordinated renewable energy support schemes

    DEFF Research Database (Denmark)

    Morthorst, P.E.; Jensen, S.G.

    2006-01-01

    . The first example covers countries with regional power markets that also regionalise their support schemes, the second countries with separate national power markets that regionalise their support schemes. The main findings indicate that the almost ideal situation exists if the region prior to regionalising...

  12. CANONICAL BACKWARD DIFFERENTIATION SCHEMES FOR ...

    African Journals Online (AJOL)

    This paper describes a new nonlinear backward differentiation schemes for the numerical solution of nonlinear initial value problems of first order ordinary differential equations. The schemes are based on rational interpolation obtained from canonical polynomials. They are A-stable. The test problems show that they give ...

  13. Microbial DNA fingerprinting of human fingerprints: dynamic colonization of fingertip microflora challenges human host inferences for forensic purposes

    NARCIS (Netherlands)

    S. Tims (Sebastian); W.J.B. van Wamel (Willem); H.P. Endtz (Hubert); A.F. van Belkum (Alex); M.H. Kayser (Manfred)

    2009-01-01

    textabstractHuman fingertip microflora is transferred to touched objects and may provide forensically relevant information on individual hosts, such as on geographic origins, if endogenous microbial skin species/strains would be retrievable from physical fingerprints and would carry geographically

  14. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-01-01

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies. PMID:29695113

  15. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor

    Directory of Open Access Journals (Sweden)

    Dat Tien Nguyen

    2018-04-01

    Full Text Available Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD method for an iris recognition system (iPAD using a near infrared light (NIR camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED. Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM. Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  16. Presentation Attack Detection for Iris Recognition System Using NIR Camera Sensor.

    Science.gov (United States)

    Nguyen, Dat Tien; Baek, Na Rae; Pham, Tuyen Danh; Park, Kang Ryoung

    2018-04-24

    Among biometric recognition systems such as fingerprint, finger-vein, or face, the iris recognition system has proven to be effective for achieving a high recognition accuracy and security level. However, several recent studies have indicated that an iris recognition system can be fooled by using presentation attack images that are recaptured using high-quality printed images or by contact lenses with printed iris patterns. As a result, this potential threat can reduce the security level of an iris recognition system. In this study, we propose a new presentation attack detection (PAD) method for an iris recognition system (iPAD) using a near infrared light (NIR) camera image. To detect presentation attack images, we first localized the iris region of the input iris image using circular edge detection (CED). Based on the result of iris localization, we extracted the image features using deep learning-based and handcrafted-based methods. The input iris images were then classified into real and presentation attack categories using support vector machines (SVM). Through extensive experiments with two public datasets, we show that our proposed method effectively solves the iris recognition presentation attack detection problem and produces detection accuracy superior to previous studies.

  17. Page Recognition: Quantum Leap In Recognition Technology

    Science.gov (United States)

    Miller, Larry

    1989-07-01

    No milestone has proven as elusive as the always-approaching "year of the LAN," but the "year of the scanner" might claim the silver medal. Desktop scanners have been around almost as long as personal computers. And everyone thinks they are used for obvious desktop-publishing and business tasks like scanning business documents, magazine articles and other pages, and translating those words into files your computer understands. But, until now, the reality fell far short of the promise. Because it's true that scanners deliver an accurate image of the page to your computer, but the software to recognize this text has been woefully disappointing. Old optical-character recognition (OCR) software recognized such a limited range of pages as to be virtually useless to real users. (For example, one OCR vendor specified 12-point Courier font from an IBM Selectric typewriter: the same font in 10-point, or from a Diablo printer, was unrecognizable!) Computer dealers have told me the chasm between OCR expectations and reality is so broad and deep that nine out of ten prospects leave their stores in disgust when they learn the limitations. And this is a very important, very unfortunate gap. Because the promise of recognition -- what people want it to do -- carries with it tremendous improvements in our productivity and ability to get tons of written documents into our computers where we can do real work with it. The good news is that a revolutionary new development effort has led to the new technology of "page recognition," which actually does deliver the promise we've always wanted from OCR. I'm sure every reader appreciates the breakthrough represented by the laser printer and page-makeup software, a combination so powerful it created new reasons for buying a computer. A similar breakthrough is happening right now in page recognition: the Macintosh (and, I must admit, other personal computers) equipped with a moderately priced scanner and OmniPage software (from Caere

  18. Comparison of fingerprint and facial biometric verification technologies for user access and patient identification in a clinical environment

    Science.gov (United States)

    Guo, Bing; Zhang, Yu; Documet, Jorge; Liu, Brent; Lee, Jasper; Shrestha, Rasu; Wang, Kevin; Huang, H. K.

    2007-03-01

    As clinical imaging and informatics systems continue to integrate the healthcare enterprise, the need to prevent patient mis-identification and unauthorized access to clinical data becomes more apparent especially under the Health Insurance Portability and Accountability Act (HIPAA) mandate. Last year, we presented a system to track and verify patients and staff within a clinical environment. This year, we further address the biometric verification component in order to determine which Biometric system is the optimal solution for given applications in the complex clinical environment. We install two biometric identification systems including fingerprint and facial recognition systems at an outpatient imaging facility, Healthcare Consultation Center II (HCCII). We evaluated each solution and documented the advantages and pitfalls of each biometric technology in this clinical environment.

  19. Improvement Schemes for Indoor Mobile Location Estimation: A Survey

    Directory of Open Access Journals (Sweden)

    Jianga Shang

    2015-01-01

    Full Text Available Location estimation is significant in mobile and ubiquitous computing systems. The complexity and smaller scale of the indoor environment impose a great impact on location estimation. The key of location estimation lies in the representation and fusion of uncertain information from multiple sources. The improvement of location estimation is a complicated and comprehensive issue. A lot of research has been done to address this issue. However, existing research typically focuses on certain aspects of the problem and specific methods. This paper reviews mainstream schemes on improving indoor location estimation from multiple levels and perspectives by combining existing works and our own working experiences. Initially, we analyze the error sources of common indoor localization techniques and provide a multilayered conceptual framework of improvement schemes for location estimation. This is followed by a discussion of probabilistic methods for location estimation, including Bayes filters, Kalman filters, extended Kalman filters, sigma-point Kalman filters, particle filters, and hidden Markov models. Then, we investigate the hybrid localization methods, including multimodal fingerprinting, triangulation fusing multiple measurements, combination of wireless positioning with pedestrian dead reckoning (PDR, and cooperative localization. Next, we focus on the location determination approaches that fuse spatial contexts, namely, map matching, landmark fusion, and spatial model-aided methods. Finally, we present the directions for future research.

  20. hybrid modulation scheme fo rid modulation scheme fo dulation

    African Journals Online (AJOL)

    eobe

    control technique is done through simulations and ex control technique .... HYBRID MODULATION SCHEME FOR CASCADED H-BRIDGE INVERTER CELLS. C. I. Odeh ..... and OR operations. Referring to ... MATLAB/SIMULINK environment.