WorldWideScience

Sample records for securing fingerprint template

  1. Template security analysis of multimodal biometric frameworks based on fingerprint and hand geometry

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric systems are automatic tools used to provide authentication during various applications of modern computing. In this work, three different design frameworks for multimodal biometric systems based on fingerprint and hand geometry modalities are proposed. An analysis is also presented to diagnose various types of template security issues in the proposed system. Fuzzy analytic hierarchy process (FAHP is applied with five decision parameters on all the designs and framework 1 is found to be better in terms of template data security, templates fusion and computational efficiency. It is noticed that template data security before storage in database is a challenging task. An important observation is that a template may be secured at feature fusion level and an indexing technique may be used to improve the size of secured templates.

  2. Cancelable remote quantum fingerprint templates protection scheme

    International Nuclear Information System (INIS)

    Liao Qin; Guo Ying; Huang Duan

    2017-01-01

    With the increasing popularity of fingerprint identification technology, its security and privacy have been paid much attention. Only the security and privacy of biological information are insured, the biological technology can be better accepted and used by the public. In this paper, we propose a novel quantum bit (qbit)-based scheme to solve the security and privacy problem existing in the traditional fingerprint identification system. By exploiting the properties of quantm mechanics, our proposed scheme, cancelable remote quantum fingerprint templates protection scheme, can achieve the unconditional security guaranteed in an information-theoretical sense. Moreover, this novel quantum scheme can invalidate most of the attacks aimed at the fingerprint identification system. In addition, the proposed scheme is applicable to the requirement of remote communication with no need to worry about its security and privacy during the transmission. This is an absolute advantage when comparing with other traditional methods. Security analysis shows that the proposed scheme can effectively ensure the communication security and the privacy of users’ information for the fingerprint identification. (paper)

  3. Finger multibiometric cryptosystems: fusion strategy and template security

    Science.gov (United States)

    Peng, Jialiang; Li, Qiong; Abd El-Latif, Ahmed A.; Niu, Xiamu

    2014-03-01

    We address two critical issues in the design of a finger multibiometric system, i.e., fusion strategy and template security. First, three fusion strategies (feature-level, score-level, and decision-level fusions) with the corresponding template protection technique are proposed as the finger multibiometric cryptosystems to protect multiple finger biometric templates of fingerprint, finger vein, finger knuckle print, and finger shape modalities. Second, we theoretically analyze different fusion strategies for finger multibiometric cryptosystems with respect to their impact on security and recognition accuracy. Finally, the performance of finger multibiometric cryptosystems at different fusion levels is investigated on a merged finger multimodal biometric database. The comparative results suggest that the proposed finger multibiometric cryptosystem at feature-level fusion outperforms other approaches in terms of verification performance and template security.

  4. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    Directory of Open Access Journals (Sweden)

    Arvind Selwal

    2016-09-01

    Full Text Available Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric modalities of the user and protect the raw images. To minimize spoof attacks on biometric systems by unauthorised users one of the solutions is to use multi-biometric systems. Multi-modal biometric system works by using fusion technique to merge feature templates generated from different modalities of the human. In this work a new scheme is proposed to secure template during feature fusion level. Scheme is based on union operation of fuzzy relations of templates of modalities during fusion process of multimodal biometric systems. This approach serves dual purpose of feature fusion as well as transformation of templates into a single secured non invertible template. The proposed technique is cancelable and experimentally tested on a bimodal biometric system comprising of fingerprint and hand geometry. Developed scheme removes the problem of an attacker learning the original minutia position in fingerprint and various measurements of hand geometry. Given scheme provides improved performance of the system with reduction in false accept rate and improvement in genuine accept rate.

  5. A Fingerprint Encryption Scheme Based on Irreversible Function and Secure Authentication

    Directory of Open Access Journals (Sweden)

    Yijun Yang

    2015-01-01

    Full Text Available A fingerprint encryption scheme based on irreversible function has been designed in this paper. Since the fingerprint template includes almost the entire information of users’ fingerprints, the personal authentication can be determined only by the fingerprint features. This paper proposes an irreversible transforming function (using the improved SHA1 algorithm to transform the original minutiae which are extracted from the thinned fingerprint image. Then, Chinese remainder theorem is used to obtain the biokey from the integration of the transformed minutiae and the private key. The result shows that the scheme has better performance on security and efficiency comparing with other irreversible function schemes.

  6. Biometric Template Security

    Directory of Open Access Journals (Sweden)

    Abhishek Nagar

    2008-03-01

    Full Text Available Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorization of the various vulnerabilities of a biometric system and discuss countermeasures that have been proposed to address these vulnerabilities. In particular, we focus on biometric template security which is an important issue because, unlike passwords and tokens, compromised biometric templates cannot be revoked and reissued. Protecting the template is a challenging task due to intrauser variability in the acquired biometric traits. We present an overview of various biometric template protection schemes and discuss their advantages and limitations in terms of security, revocability, and impact on matching accuracy. A template protection scheme with provable security and acceptable recognition performance has thus far remained elusive. Development of such a scheme is crucial as biometric systems are beginning to proliferate into the core physical and information infrastructure of our society.

  7. A Novel Approach Based on PCNNs Template for Fingerprint Image Thinning

    NARCIS (Netherlands)

    Dacheng, X.; Bailiang, L.; Nijholt, Antinus; Kacprzyk, J.

    2009-01-01

    A PCNNs-based square-and-triangle-template method for binary fingerprint image thinning is proposed. The algorithm is iterative, in which a combined sequential and parallel processing is employed to accelerate execution. When a neuron satisfies the square template, the pixel corresponding to this

  8. Minutia-pair spectral representations for fingerprint template protection

    NARCIS (Netherlands)

    Stanko, T.; Skoric, B.

    2017-01-01

    We introduce a new fixed-length representation of fingerprint minutiae, for use in template protection. It is similar to the `spectral minutiae' representation of Xu et al. but is based on coordinate differences between pairs of minutiae. Our technique has the advantage that it does not discard the

  9. A fingerprint key binding algorithm based on vector quantization and error correction

    Science.gov (United States)

    Li, Liang; Wang, Qian; Lv, Ke; He, Ning

    2012-04-01

    In recent years, researches on seamless combination cryptosystem with biometric technologies, e.g. fingerprint recognition, are conducted by many researchers. In this paper, we propose a binding algorithm of fingerprint template and cryptographic key to protect and access the key by fingerprint verification. In order to avoid the intrinsic fuzziness of variant fingerprints, vector quantization and error correction technique are introduced to transform fingerprint template and then bind with key, after a process of fingerprint registration and extracting global ridge pattern of fingerprint. The key itself is secure because only hash value is stored and it is released only when fingerprint verification succeeds. Experimental results demonstrate the effectiveness of our ideas.

  10. A STRONG SECURITY PROTOCOL AGAINST FINGERPRINT DATABASE ATTACKS

    Directory of Open Access Journals (Sweden)

    U. Latha

    2013-08-01

    Full Text Available The Biometric data is subject to on-going changes and create a crucial problem in fingerprint database. To deal with this, a security protocol is proposed to protect the finger prints information from the prohibited users. Here, a security protocol is proposed to protect the finger prints information. The proposed system comprised of three phases namely, fingerprint reconstruction, feature extraction and development of trigon based security protocol. In fingerprint reconstruction, the different crack variance level finger prints images are reconstructed by the M-band Dual Tree Complex Wavelet Transform (DTCWT. After that features are extracted by binarization. A set of finger print images are utilized to evaluate the performance of security protocol and the result from this process guarantees the healthiness of the proposed trigon based security protocol. The implementation results show the effectiveness of proposed trigon based security protocol in protecting the finger print information and the achieved improvement in image reconstruction and the security process.

  11. Fingerprint multicast in secure video streaming.

    Science.gov (United States)

    Zhao, H Vicky; Liu, K J Ray

    2006-01-01

    Digital fingerprinting is an emerging technology to protect multimedia content from illegal redistribution, where each distributed copy is labeled with unique identification information. In video streaming, huge amount of data have to be transmitted to a large number of users under stringent latency constraints, so the bandwidth-efficient distribution of uniquely fingerprinted copies is crucial. This paper investigates the secure multicast of anticollusion fingerprinted video in streaming applications and analyzes their performance. We first propose a general fingerprint multicast scheme that can be used with most spread spectrum embedding-based multimedia fingerprinting systems. To further improve the bandwidth efficiency, we explore the special structure of the fingerprint design and propose a joint fingerprint design and distribution scheme. From our simulations, the two proposed schemes can reduce the bandwidth requirement by 48% to 87%, depending on the number of users, the characteristics of video sequences, and the network and computation constraints. We also show that under the constraint that all colluders have the same probability of detection, the embedded fingerprints in the two schemes have approximately the same collusion resistance. Finally, we propose a fingerprint drift compensation scheme to improve the quality of the reconstructed sequences at the decoder's side without introducing extra communication overhead.

  12. Integrated fingerprinting in secure digital cinema projection

    Science.gov (United States)

    Delannay, Damien; Delaigle, Jean-Francois; Macq, Benoit M. M.; Quisquater, Jean-Jacques; Mas Ribes, Joan M.; Boucqueau, Jean M.; Nivart, Jean-Francois

    2001-12-01

    This paper describes the functional model of a combined conditional access and fingerprinting copyright (-or projectionright) protection system in a digital cinema framework. In the cinema industry, a large part of early movie piracy comes from copies made in the theater itself with a camera. The evolution towards digital cinema broadcast enables watermark based fingerprinting protection systems. Besides an appropriate fingerprinting technology, a number of well defined security/cryptographic tools are integrated in order to guaranty the integrity of the whole system. The requirements are two-fold: On one side, we must ensure that the media content is only accessible at exhibition time (under specific authorization obtained after an ad-hoc film rental agreement) and contains the related exhibition fingerprint. At the other end, we must prove our ability to retrieve the fingerprint information from an illegal copy of the media.

  13. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    Directory of Open Access Journals (Sweden)

    Raymond N. J. Veldhuis

    2012-04-01

    Full Text Available In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples.

  14. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    Science.gov (United States)

    Yang, Bian; Busch, Christoph; de Groot, Koen; Xu, Haiyun; Veldhuis, Raymond N. J.

    2012-01-01

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric characteristic. Compared to an unprotected system, most existing biometric template protection methods cause to a certain extent degradation in biometric performance. Fusion is therefore a promising way to enhance the biometric performance in template-protected biometric systems. Compared to feature level fusion and score level fusion, decision level fusion has not only the least fusion complexity, but also the maximum interoperability across different biometric features, template protection and recognition algorithms, templates formats, and comparison score rules. However, performance improvement via decision level fusion is not obvious. It is influenced by both the dependency and the performance gap among the conducted tests for fusion. We investigate in this paper several fusion scenarios (multi-sample, multi-instance, multi-sensor, multi-algorithm, and their combinations) on the binary decision level, and evaluate their biometric performance and fusion efficiency on a multi-sensor fingerprint database with 71,994 samples. PMID:22778583

  15. Implementation Support of Security Design Patterns Using Test Templates

    Directory of Open Access Journals (Sweden)

    Masatoshi Yoshizawa

    2016-06-01

    Full Text Available Security patterns are intended to support software developers as the patterns encapsulate security expert knowledge. However, these patterns may be inappropriately applied because most developers are not security experts, leading to threats and vulnerabilities. Here we propose a support method for security design patterns in the implementation phase of software development. Our method creates a test template from a security design pattern, consisting of an “aspect test template” to observe the internal processing and a “test case template”. Providing design information creates a test from the test template with a tool. Because our test template is reusable, it can easily perform a test to validate a security design pattern. In an experiment involving four students majoring in information sciences, we confirm that our method can realize an effective test, verify pattern applications, and support pattern implementation.

  16. Secure fingerprint identification based on structural and microangiographic optical coherence tomography.

    Science.gov (United States)

    Liu, Xuan; Zaki, Farzana; Wang, Yahui; Huang, Qiongdan; Mei, Xin; Wang, Jiangjun

    2017-03-10

    Optical coherence tomography (OCT) allows noncontact acquisition of fingerprints and hence is a highly promising technology in the field of biometrics. OCT can be used to acquire both structural and microangiographic images of fingerprints. Microangiographic OCT derives its contrast from the blood flow in the vasculature of viable skin tissue, and microangiographic fingerprint imaging is inherently immune to fake fingerprint attack. Therefore, dual-modality (structural and microangiographic) OCT imaging of fingerprints will enable more secure acquisition of biometric data, which has not been investigated before. Our study on fingerprint identification based on structural and microangiographic OCT imaging is, we believe, highly innovative. In this study, we performed OCT imaging study for fingerprint acquisition, and demonstrated the capability of dual-modality OCT imaging for the identification of fake fingerprints.

  17. Chaotic secure content-based hidden transmission of biometric templates

    International Nuclear Information System (INIS)

    Khan, Muhammad Khurram; Zhang Jiashu; Tian Lei

    2007-01-01

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature

  18. Chaotic secure content-based hidden transmission of biometric templates

    Energy Technology Data Exchange (ETDEWEB)

    Khan, Muhammad Khurram [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)]. E-mail: khurram.khan@scientist.com; Zhang Jiashu [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China); Tian Lei [Research Group for Biometrics and Security, Sichuan Province Key Lab of Signal and Information Processing, Southwest Jiaotong University, Chengdu 610031, Sichuan (China)

    2007-06-15

    The large-scale proliferation of biometric verification systems creates a demand for effective and reliable security and privacy of its data. Like passwords and PIN codes, biometric data is also not secret and if it is compromised, the integrity of the whole verification system could be at high risk. To address these issues, this paper presents a novel chaotic secure content-based hidden transmission scheme of biometric data. Encryption and data hiding techniques are used to improve the security and secrecy of the transmitted templates. Secret keys are generated by the biometric image and used as the parameter value and initial condition of the chaotic map, and each transaction session has different secret keys to protect from the attacks. Two chaotic maps are incorporated for the encryption to resolve the finite word length effect and to improve the system's resistance against attacks. Encryption is applied on the biometric templates before hiding into the cover/host images to make them secure, and then templates are hidden into the cover image. Experimental results show that the security, performance, and accuracy of the presented scheme are encouraging comparable with other methods found in the current literature.

  19. Design And Implementation Of Bank Locker Security System Based On Fingerprint Sensing Circuit And RFID Reader

    Directory of Open Access Journals (Sweden)

    Khaing Mar Htwe

    2015-07-01

    Full Text Available Abstract The main goal of this system is to design a locker security system using RFID and Fingerprint. In this system only authenticated person can open the door. A security system is implemented containing door locking system using passive type of RFID which can activate authenticate and validate the user and unlock the door in real time for secure access. The advantage of using passive RFID is that it functions without a battery and passive tags are lighter and are less expensive than the active tags. This system consists of fingerprint reader microcontroller RFID reader and PC. The RFID reader reads the id number from passive. The fingerprint sensor will check incoming image with enrolled data and it will send confirming signal for C program. If both RFID check and fingerprint image confirmation are matched the microcontroller will drive door motor according to sensors at door edges. This system is more secure than other systems because two codes protection method used.

  20. Efficient and Secure Fingerprint Verification for Embedded Devices

    Directory of Open Access Journals (Sweden)

    Sakiyama Kazuo

    2006-01-01

    Full Text Available This paper describes a secure and memory-efficient embedded fingerprint verification system. It shows how a fingerprint verification module originally developed to run on a workstation can be transformed and optimized in a systematic way to run real-time on an embedded device with limited memory and computation power. A complete fingerprint recognition module is a complex application that requires in the order of 1000 M unoptimized floating-point instruction cycles. The goal is to run both the minutiae extraction and the matching engines on a small embedded processor, in our case a 50 MHz LEON-2 softcore. It does require optimization and acceleration techniques at each design step. In order to speed up the fingerprint signal processing phase, we propose acceleration techniques at the algorithm level, at the software level to reduce the execution cycle number, and at the hardware level to distribute the system work load. Thirdly, a memory trace map-based memory reduction strategy is used for lowering the system memory requirement. Lastly, at the hardware level, it requires the development of specialized coprocessors. As results of these optimizations, we achieve a 65% reduction on the execution time and a 67% reduction on the memory storage requirement for the minutiae extraction process, compared against the reference implementation. The complete operation, that is, fingerprint capture, feature extraction, and matching, can be done in real-time of less than 4 seconds

  1. Reference point detection for improved fingerprint matching

    NARCIS (Netherlands)

    Ignatenko, T.; Kalker, A.A.C.M.; Veen, van der M.; Bazen, A.; Delp, E.J.; Wong, P.W.

    2006-01-01

    One of the important stages of fingerprint recognition is the registration of the fingerprints with respect to the original template. This is not a straightforward task as fingerprint images may have been subject to rotations and translations. Popular techniques for fingerprint registration use a

  2. A STUDY ON BIOMETRIC TEMPLATE SECURITY

    Directory of Open Access Journals (Sweden)

    N. Radha

    2010-07-01

    Full Text Available The increasing popularity of biometrics and cryptography is driven by the widespread stipulation on information security. Abundant efforts have been made in developing successful methods in these areas in order to accomplish an enhanced level of information security. There are two dominant issues in information security enhancement. One is to defend the user ownership and control the access to information by authenticating an individual’s identity. The other is to make sure the privacy and integrity of information and to secure communication. Cryptography is the science of writing in secret code. Secret-key cryptography and public-key cryptography are the two most important cryptographic architectures. The security of a cryptographic system is reliant on the secrecy of the cryptographic key. Biometric authentication or simply biometrics refers to establishing automatic personal recognition based on the physical and behavioral characteristics of an individual (e.g. face, voice, fingerprint, gait, hand geometry, iris, gene, etc.. Biometrics offers superior security and easier than traditional identity authentication systems (based on passwords and cryptographic keys.Since biometrics characteristics are naturally related with a particular individual, making them insusceptible to being stolen, forgotten, lost or attached. This paper presents a survey on various techniques proposed earlier in developing an authentication system for ensuring individual’s information security by combining biometric characteristics of that particular individual and the cryptographic techniques. In addition, it provides some fundamental idea for future research that may help in eliminating the problems associated with the present authentication systems.

  3. Improving the redistribution of the security lessons in healthcare: An evaluation of the Generic Security Template.

    Science.gov (United States)

    He, Ying; Johnson, Chris

    2015-11-01

    The recurrence of past security breaches in healthcare showed that lessons had not been effectively learned across different healthcare organisations. Recent studies have identified the need to improve learning from incidents and to share security knowledge to prevent future attacks. Generic Security Templates (GSTs) have been proposed to facilitate this knowledge transfer. The objective of this paper is to evaluate whether potential users in healthcare organisations can exploit the GST technique to share lessons learned from security incidents. We conducted a series of case studies to evaluate GSTs. In particular, we used a GST for a security incident in the US Veterans' Affairs Administration to explore whether security lessons could be applied in a very different Chinese healthcare organisation. The results showed that Chinese security professional accepted the use of GSTs and that cyber security lessons could be transferred to a Chinese healthcare organisation using this approach. The users also identified the weaknesses and strengths of GSTs, providing suggestions for future improvements. Generic Security Templates can be used to redistribute lessons learned from security incidents. Sharing cyber security lessons helps organisations consider their own practices and assess whether applicable security standards address concerns raised in previous breaches in other countries. The experience gained from this study provides the basis for future work in conducting similar studies in other healthcare organisations. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  4. A SCHEME FOR TEMPLATE SECURITY AT FEATURE FUSION LEVEL IN MULTIMODAL BIOMETRIC SYSTEM

    OpenAIRE

    Arvind Selwal; Sunil Kumar Gupta; Surender Kumar

    2016-01-01

    Biometric is the science of human recognition based upon using their biological, chemical or behavioural traits. These systems are used in many real life applications simply from biometric based attendance system to providing security at very sophisticated level. A biometric system deals with raw data captured using a sensor and feature template extracted from raw image. One of the challenges being faced by designers of these systems is to secure template data extracted from the biometric mod...

  5. Privacy protection schemes for fingerprint recognition systems

    Science.gov (United States)

    Marasco, Emanuela; Cukic, Bojan

    2015-05-01

    The deployment of fingerprint recognition systems has always raised concerns related to personal privacy. A fingerprint is permanently associated with an individual and, generally, it cannot be reset if compromised in one application. Given that fingerprints are not a secret, potential misuses besides personal recognition represent privacy threats and may lead to public distrust. Privacy mechanisms control access to personal information and limit the likelihood of intrusions. In this paper, image- and feature-level schemes for privacy protection in fingerprint recognition systems are reviewed. Storing only key features of a biometric signature can reduce the likelihood of biometric data being used for unintended purposes. In biometric cryptosystems and biometric-based key release, the biometric component verifies the identity of the user, while the cryptographic key protects the communication channel. Transformation-based approaches only a transformed version of the original biometric signature is stored. Different applications can use different transforms. Matching is performed in the transformed domain which enable the preservation of low error rates. Since such templates do not reveal information about individuals, they are referred to as cancelable templates. A compromised template can be re-issued using a different transform. At image-level, de-identification schemes can remove identifiers disclosed for objectives unrelated to the original purpose, while permitting other authorized uses of personal information. Fingerprint images can be de-identified by, for example, mixing fingerprints or removing gender signature. In both cases, degradation of matching performance is minimized.

  6. Distorted Fingerprint Verification System

    Directory of Open Access Journals (Sweden)

    Divya KARTHIKAESHWARAN

    2011-01-01

    Full Text Available Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.

  7. Online fingerprint verification.

    Science.gov (United States)

    Upendra, K; Singh, S; Kumar, V; Verma, H K

    2007-01-01

    As organizations search for more secure authentication methods for user access, e-commerce, and other security applications, biometrics is gaining increasing attention. With an increasing emphasis on the emerging automatic personal identification applications, fingerprint based identification is becoming more popular. The most widely used fingerprint representation is the minutiae based representation. The main drawback with this representation is that it does not utilize a significant component of the rich discriminatory information available in the fingerprints. Local ridge structures cannot be completely characterized by minutiae. Also, it is difficult quickly to match two fingerprint images containing different number of unregistered minutiae points. In this study filter bank based representation, which eliminates these weakness, is implemented and the overall performance of the developed system is tested. The results have shown that this system can be used effectively for secure online verification applications.

  8. On the introduction of secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available The concept of fingerprint classification is an important one because of the need to, before executing a database search procedure, virtually break the fingerprint template database into smaller, manageable partitions. This is done in order to avoid...

  9. Fingerprint pores extractor

    CSIR Research Space (South Africa)

    Mngenge, NA

    2012-11-01

    Full Text Available , this is not always the case because of diseases and hash working conditions that affect fingerprints. In order to maintain high level of security independent of varying fingerprint image quality research suggests the use of other fingerprint features to compliment...

  10. An SDN-Based Fingerprint Hopping Method to Prevent Fingerprinting Attacks

    Directory of Open Access Journals (Sweden)

    Zheng Zhao

    2017-01-01

    Full Text Available Fingerprinting attacks are one of the most severe threats to the security of networks. Fingerprinting attack aims to obtain the operating system information of target hosts to make preparations for future attacks. In this paper, a fingerprint hopping method (FPH is proposed based on software-defined networks to defend against fingerprinting attacks. FPH introduces the idea of moving target defense to show a hopping fingerprint toward the fingerprinting attackers. The interaction of the fingerprinting attack and its defense is modeled as a signal game, and the equilibriums of the game are analyzed to develop an optimal defense strategy. Experiments show that FPH can resist fingerprinting attacks effectively.

  11. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Science.gov (United States)

    Chen, Chi-Jim; Pai, Tun-Wen; Cheng, Mox

    2015-01-01

    A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS), successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM), based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates. PMID:25835186

  12. A Support Vector Machine Approach for Truncated Fingerprint Image Detection from Sweeping Fingerprint Sensors

    Directory of Open Access Journals (Sweden)

    Chi-Jim Chen

    2015-03-01

    Full Text Available A sweeping fingerprint sensor converts fingerprints on a row by row basis through image reconstruction techniques. However, a built fingerprint image might appear to be truncated and distorted when the finger was swept across a fingerprint sensor at a non-linear speed. If the truncated fingerprint images were enrolled as reference targets and collected by any automated fingerprint identification system (AFIS, successful prediction rates for fingerprint matching applications would be decreased significantly. In this paper, a novel and effective methodology with low time computational complexity was developed for detecting truncated fingerprints in a real time manner. Several filtering rules were implemented to validate existences of truncated fingerprints. In addition, a machine learning method of supported vector machine (SVM, based on the principle of structural risk minimization, was applied to reject pseudo truncated fingerprints containing similar characteristics of truncated ones. The experimental result has shown that an accuracy rate of 90.7% was achieved by successfully identifying truncated fingerprint images from testing images before AFIS enrollment procedures. The proposed effective and efficient methodology can be extensively applied to all existing fingerprint matching systems as a preliminary quality control prior to construction of fingerprint templates.

  13. ENHANCING NETWORK SECURITY USING 'LEARNING-FROM-SIGNALS' AND FRACTIONAL FOURIER TRANSFORM BASED RF-DNA FINGERPRINTS

    Energy Technology Data Exchange (ETDEWEB)

    Buckner, Mark A [ORNL; Bobrek, Miljko [ORNL; Farquhar, Ethan [ORNL; Harmer, Paul K [Air Force Institute of Technology; Temple, Michael A [Air Force Institute of Technology

    2011-01-01

    Wireless Access Points (WAP) remain one of the top 10 network security threats. This research is part of an effort to develop a physical (PHY) layer aware Radio Frequency (RF) air monitoring system with multi-factor authentication to provide a first-line of defense for network security--stopping attackers before they can gain access to critical infrastructure networks through vulnerable WAPs. This paper presents early results on the identification of OFDM-based 802.11a WiFi devices using RF Distinct Native Attribute (RF-DNA) fingerprints produced by the Fractional Fourier Transform (FRFT). These fingerprints are input to a "Learning from Signals" (LFS) classifier which uses hybrid Differential Evolution/Conjugate Gradient (DECG) optimization to determine the optimal features for a low-rank model to be used for future predictions. Results are presented for devices under the most challenging conditions of intra-manufacturer classification, i.e., same-manufacturer, same-model, differing only in serial number. The results of Fractional Fourier Domain (FRFD) RF-DNA fingerprints demonstrate significant improvement over results based on Time Domain (TD), Spectral Domain (SD) and even Wavelet Domain (WD) fingerprints.

  14. Fingerprint Recognition using Fuzzy Logic with Triangular Pattern Template

    DEFF Research Database (Denmark)

    Hussain, Dil Muhammad Akbar

    2006-01-01

    A fingerprint is a pattern of ridges and valleys that exist on the surface of the finger. The uniqueness of a fingerprint is typically determined by the overall pattern of ridges and valleys as well as the local ridge structures e.g., a ridge bifurcation or a ridge ending, which are called minutiae...

  15. Fingerprint matching on smart card: A review

    CSIR Research Space (South Africa)

    Baruni, Kedimotse P

    2016-12-01

    Full Text Available Fingerprint Match-on-Card (MoC) offers the highest degree of privacy and security to cardholders as the fingerprint never leaves the secure environment of a smart card. The level of security of a biometric system is evaluated by the location where...

  16. Security and matching of partial fingerprint recognition systems

    Science.gov (United States)

    Jea, Tsai-Yang; Chavan, Viraj S.; Govindaraju, Venu; Schneider, John K.

    2004-08-01

    Despite advances in fingerprint identification techniques, matching incomplete or partial fingerprints still poses a difficult challenge. While the introduction of compact silicon chip-based sensors that capture only a part of the fingerprint area have made this problem important from a commercial perspective, there is also considerable interest on the topic for processing partial and latent fingerprints obtained at crime scenes. Attempts to match partial fingerprints using singular ridge structures-based alignment techniques fail when the partial print does not include such structures (e.g., core or delta). We present a multi-path fingerprint matching approach that utilizes localized secondary features derived using only the relative information of minutiae. Since the minutia-based fingerprint representation, is an ANSI-NIST standard, our approach has the advantage of being directly applicable to already existing databases. We also analyze the vulnerability of partial fingerprint identification systems to brute force attacks. The described matching approach has been tested on one of FVC2002"s DB1 database11. The experimental results show that our approach achieves an equal error rate of 1.25% and a total error rate of 1.8% (with FAR at 0.2% and FRR at 1.6%).

  17. Detection of cores in fingerprints with improved dimension reduction

    NARCIS (Netherlands)

    Bazen, A.M.; Veldhuis, Raymond N.J.

    In this paper, we present a statistical approach to core detection in fingerprint images that is based on the likelihood ratio, using models of variation of core templates and randomly chosen templates. Additionally, we propose an alternative dimension reduction method. Unlike standard linear

  18. Image-based fingerprint verification system using LabVIEW

    Directory of Open Access Journals (Sweden)

    Sunil K. Singla

    2008-09-01

    Full Text Available Biometric-based identification/verification systems provide a solution to the security concerns in the modern world where machine is replacing human in every aspect of life. Fingerprints, because of their uniqueness, are the most widely used and highly accepted biometrics. Fingerprint biometric systems are either minutiae-based or pattern learning (image based. The minutiae-based algorithm depends upon the local discontinuities in the ridge flow pattern and are used when template size is important while image-based matching algorithm uses both the micro and macro feature of a fingerprint and is used if fast response is required. In the present paper an image-based fingerprint verification system is discussed. The proposed method uses a learning phase, which is not present in conventional image-based systems. The learning phase uses pseudo random sub-sampling, which reduces the number of comparisons needed in the matching stage. This system has been developed using LabVIEW (Laboratory Virtual Instrument Engineering Workbench toolbox version 6i. The availability of datalog files in LabVIEW makes it one of the most promising candidates for its usage as a database. Datalog files can access and manipulate data and complex data structures quickly and easily. It makes writing and reading much faster. After extensive experimentation involving a large number of samples and different learning sizes, high accuracy with learning image size of 100 100 and a threshold value of 700 (1000 being the perfect match has been achieved.

  19. Enhancing security of fingerprints through contextual biometric watermarking.

    Science.gov (United States)

    Noore, Afzel; Singh, Richa; Vatsa, Mayank; Houck, Max M

    2007-07-04

    This paper presents a novel digital watermarking technique using face and demographic text data as multiple watermarks for verifying the chain of custody and protecting the integrity of a fingerprint image. The watermarks are embedded in selected texture regions of a fingerprint image using discrete wavelet transform. Experimental results show that modifications in these locations are visually imperceptible and maintain the minutiae details. The integrity of the fingerprint image is verified through the high matching scores obtained from an automatic fingerprint identification system. There is also a high degree of visual correlation between the embedded images, and the extracted images from the watermarked fingerprint. The degree of similarity is computed using pixel-based metrics and human visual system metrics. The results also show that the proposed watermarked fingerprint and the extracted images are resilient to common attacks such as compression, filtering, and noise.

  20. Fingerprint re-alignment: a solution based on the true fingerprint center point

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-02-01

    Full Text Available Solution Based on the True Fingerprint Center Point Ishmael S. Msiza, Brain Leke-Betechuoh, and Tendani Malumedzha Biometrics Research Group ? Information Security CSIR, Modelling & Digital Science Unit Pretoria, Republic of South Africa e... with a pattern that belongs to the Tented Arch (TA) fingerprint class. Fingerprints that belong to the TA class have a single core and a single delta, with the core located almost directly above the delta, as depicted in figure 3 (b). Many singular...

  1. Printable, scannable biometric templates for secure documents and materials

    Science.gov (United States)

    Cambier, James L.; Musgrave, Clyde

    2000-04-01

    Biometric technology has been widely acknowledged as an effective means for enhancing private and public security through applications in physical access control, computer and computer network access control, medical records protection, banking security, public identification programs, and others. Nearly all of these applications involve use of a biometric token to control access to a physical entity or private information. There are also unique benefits to be derived from attaching a biometric template to a physical entity such as a document, package, laboratory sample, etc. Such an association allows fast, reliable, and highly accurate association of an individual person's identity to the physical entity, and can be used to enhance security, convenience, and privacy in many types of transactions. Examples include authentication of documents, tracking of laboratory samples in a testing environment, monitoring the movement of physical evidence within the criminal justice system, and authenticating the identity of both sending and receiving parties in shipment of high value parcels. A system is described which combines a biometric technology based on iris recognition with a printing and scanning technology for high-density bar codes.

  2. Fingerprint matching with optical coherence tomography

    CSIR Research Space (South Africa)

    Moolla, Y

    2015-12-01

    Full Text Available Fingerprint recognition is an important security technique with a steadily growing usage for the identification and verification of individuals. However, current fingerprint acquisition systems have certain disadvantages, which include...

  3. Gabor filter based fingerprint image enhancement

    Science.gov (United States)

    Wang, Jin-Xiang

    2013-03-01

    Fingerprint recognition technology has become the most reliable biometric technology due to its uniqueness and invariance, which has been most convenient and most reliable technique for personal authentication. The development of Automated Fingerprint Identification System is an urgent need for modern information security. Meanwhile, fingerprint preprocessing algorithm of fingerprint recognition technology has played an important part in Automatic Fingerprint Identification System. This article introduces the general steps in the fingerprint recognition technology, namely the image input, preprocessing, feature recognition, and fingerprint image enhancement. As the key to fingerprint identification technology, fingerprint image enhancement affects the accuracy of the system. It focuses on the characteristics of the fingerprint image, Gabor filters algorithm for fingerprint image enhancement, the theoretical basis of Gabor filters, and demonstration of the filter. The enhancement algorithm for fingerprint image is in the windows XP platform with matlab.65 as a development tool for the demonstration. The result shows that the Gabor filter is effective in fingerprint image enhancement technology.

  4. Generating cancelable fingerprint templates.

    Science.gov (United States)

    Ratha, Nalini K; Chikkerur, Sharat; Connell, Jonathan H; Bolle, Ruud M

    2007-04-01

    Biometrics-based authentication systems offer obvious usability advantages over traditional password and token-based authentication schemes. However, biometrics raises several privacy concerns. A biometric is permanently associated with a user and cannot be changed. Hence, if a biometric identifier is compromised, it is lost forever and possibly for every application where the biometric is used. Moreover, if the same biometric is used in multiple applications, a user can potentially be tracked from one application to the next by cross-matching biometric databases. In this paper, we demonstrate several methods to generate multiple cancelable identifiers from fingerprint images to overcome these problems. In essence, a user can be given as many biometric identifiers as needed by issuing a new transformation "key." The identifiers can be cancelled and replaced when compromised. We empirically compare the performance of several algorithms such as Cartesian, polar, and surface folding transformations of the minutiae positions. It is demonstrated through multiple experiments that we can achieve revocability and prevent cross-matching of biometric databases. It is also shown that the transforms are noninvertible by demonstrating that it is computationally as hard to recover the original biometric identifier from a transformed version as by randomly guessing. Based on these empirical results and a theoretical analysis we conclude that feature-level cancelable biometric construction is practicable in large biometric deployments.

  5. Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

    Directory of Open Access Journals (Sweden)

    Cherubin Giovanni

    2017-10-01

    Full Text Available Website Fingerprinting (WF attacks raise major concerns about users’ privacy. They employ Machine Learning (ML techniques to allow a local passive adversary to uncover the Web browsing behavior of a user, even if she browses through an encrypted tunnel (e.g. Tor, VPN. Numerous defenses have been proposed in the past; however, it is typically difficult to have formal guarantees on their security, which is most often evaluated empirically against state-of-the-art attacks. In this paper, we present a practical method to derive security bounds for any WF defense, where the bounds depend on a chosen feature set. This result derives from reducing WF attacks to an ML classification task, where we can determine the smallest achievable error (the Bayes error. Such error can be estimated in practice, and is a lower bound for a WF adversary, for any classification algorithm he may use. Our work has two main consequences: i it allows determining the security of WF defenses, in a black-box manner, with respect to the state-of-the-art feature set and ii it favors shifting the focus of future WF research to identifying optimal feature sets. The generality of this approach further suggests that the method could be used to define security bounds for other ML-based attacks.

  6. Wolf Attack Probability: A Theoretical Security Measure in Biometric Authentication Systems

    Science.gov (United States)

    Une, Masashi; Otsuka, Akira; Imai, Hideki

    This paper will propose a wolf attack probability (WAP) as a new measure for evaluating security of biometric authentication systems. The wolf attack is an attempt to impersonate a victim by feeding “wolves” into the system to be attacked. The “wolf” means an input value which can be falsely accepted as a match with multiple templates. WAP is defined as a maximum success probability of the wolf attack with one wolf sample. In this paper, we give a rigorous definition of the new security measure which gives strength estimation of an individual biometric authentication system against impersonation attacks. We show that if one reestimates using our WAP measure, a typical fingerprint algorithm turns out to be much weaker than theoretically estimated by Ratha et al. Moreover, we apply the wolf attack to a finger-vein-pattern based algorithm. Surprisingly, we show that there exists an extremely strong wolf which falsely matches all templates for any threshold value.

  7. Missing data reconstruction using Gaussian mixture models for fingerprint images

    Science.gov (United States)

    Agaian, Sos S.; Yeole, Rushikesh D.; Rao, Shishir P.; Mulawka, Marzena; Troy, Mike; Reinecke, Gary

    2016-05-01

    Publisher's Note: This paper, originally published on 25 May 2016, was replaced with a revised version on 16 June 2016. If you downloaded the original PDF, but are unable to access the revision, please contact SPIE Digital Library Customer Service for assistance. One of the most important areas in biometrics is matching partial fingerprints in fingerprint databases. Recently, significant progress has been made in designing fingerprint identification systems for missing fingerprint information. However, a dependable reconstruction of fingerprint images still remains challenging due to the complexity and the ill-posed nature of the problem. In this article, both binary and gray-level images are reconstructed. This paper also presents a new similarity score to evaluate the performance of the reconstructed binary image. The offered fingerprint image identification system can be automated and extended to numerous other security applications such as postmortem fingerprints, forensic science, investigations, artificial intelligence, robotics, all-access control, and financial security, as well as for the verification of firearm purchasers, driver license applicants, etc.

  8. Laser speckle decorrelation for fingerprint acquisition

    International Nuclear Information System (INIS)

    Schirripa Spagnolo, Giuseppe; Cozzella, Lorenzo

    2012-01-01

    Biometry is gaining popularity as a physical security approach in situations where a high level of security is necessary. Currently, biometric solutions are embedded in a very large and heterogeneous group of applications. One of the most sensible is for airport security access to boarding gates. More airports are introducing biometric solutions based on face, fingerprint or iris recognition for passenger identification. In particular, fingerprints are the most widely used biometric, and they are mandatorily included in electronic identification documents. One important issue, which is difficult to address in traditional fingerprint acquisition systems, is preventing contact between subsequent users; sebum, which can be a potential vector for contagious diseases. Currently, non-contact devices are used to overcome this problem. In this paper, a new contact device based on laser speckle decorrelation is presented. Our system has the advantage of being compact and low-cost compared with an actual contactless system, allowing enhancement of the sebum pattern imaging contrast in a simple and low-cost way. Furthermore, it avoids the spreading of contagious diseases. (paper)

  9. An Investigation on the Problem of Thinning in Fingerprint Processing

    Directory of Open Access Journals (Sweden)

    I. O. Omeiza

    2012-06-01

    Full Text Available A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reliability and thus require additional minutiae-pruning stage to discard the erroneous minutiae in the obtained skeletons. The work involves a careful blending of some already existing algorithms to achieve optimal performance in thinning binarised fingerprint images. The algorithms considered are as follows. The "Zhang and Suen" parallel algorithm for thinning digital patterns, the improved parallel thinning algorithm by Holt and company and template-based thinning algorithm by Stentiford and Mortimer. The idea of combining these stand-alone algorithms to improve the quality of obtained objects skeleton in general image processing was first suggested in a text by Parker in 1998. However, his work does not specifically address the fingerprint problem. This work has examined and proves the plausibility of this thinning approach in the particular case of fingerprint application domain. The thinning procedure obtained satisfactory skeletons for fingerprint applications.

  10. Welding template

    International Nuclear Information System (INIS)

    Ben Venue, R.J. of.

    1976-01-01

    A welding template is described which is used to weld strip material into a cellular grid structure for the accommodation of fuel elements in a nuclear reactor. On a base plate the template carries a multitude of cylindrical pins whose upper half is narrower than the bottom half and only one of which is attached to the base plate. The others are arrested in a hexagonal array by oblong webs clamped together by chuck jaws which can be secured by means of screws. The parts are ground very accurately. The template according to the invention is very easy to make. (UWI) [de

  11. A Student Information Management System Based on Fingerprint Identification and Data Security Transmission

    Directory of Open Access Journals (Sweden)

    Pengtao Yang

    2017-01-01

    Full Text Available A new type of student information management system is designed to implement student information identification and management based on fingerprint identification. In order to ensure the security of data transmission, this paper proposes a data encryption method based on an improved AES algorithm. A new S-box is cleverly designed, which can significantly reduce the encryption time by improving ByteSub, ShiftRow, and MixColumn in the round transformation of the traditional AES algorithm with the process of look-up table. Experimental results show that the proposed algorithm can significantly improve the encryption time compared with the traditional AES algorithm.

  12. Screen Fingerprints as a Novel Modality for Active Authentication

    Science.gov (United States)

    2014-03-01

    Screen fingerprint is the new cyber biometric modality that we have proposed to measure and analyze active authentication. The screen finger ...as a new biometric modality for active authentication. Such a fingerprint is acquired by taking a screen recording of the computer being used and...extracting discriminative visual feature from the recording. 15. SUBJECT TERMS Active authentication, screen fingerprints, biometrics 16. SECURITY

  13. An investigation of fake fingerprint detection approaches

    Science.gov (United States)

    Ahmad, Asraful Syifaa'; Hassan, Rohayanti; Othman, Razib M.

    2017-10-01

    The most reliable biometrics technology, fingerprint recognition is widely used in terms of security due to its permanence and uniqueness. However, it is also vulnerable to the certain type of attacks including presenting fake fingerprints to the sensor which requires the development of new and efficient protection measures. Particularly, the aim is to identify the most recent literature related to the fake fingerprint recognition and only focus on software-based approaches. A systematic review is performed by analyzing 146 primary studies from the gross collection of 34 research papers to determine the taxonomy, approaches, online public databases, and limitations of the fake fingerprint. Fourteen software-based approaches have been briefly described, four limitations of fake fingerprint image were revealed and two known fake fingerprint databases were addressed briefly in this review. Therefore this work provides an overview of an insight into the current understanding of fake fingerprint recognition besides identifying future research possibilities.

  14. Biometric template revocation

    Science.gov (United States)

    Arndt, Craig M.

    2004-08-01

    Biometric are a powerful technology for identifying humans both locally and at a distance. In order to perform identification or verification biometric systems capture an image of some biometric of a user or subject. The image is then converted mathematical to representation of the person call a template. Since we know that every human in the world is different each human will have different biometric images (different fingerprints, or faces, etc.). This is what makes biometrics useful for identification. However unlike a credit card number or a password to can be given to a person and later revoked if it is compromised and biometric is with the person for life. The problem then is to develop biometric templates witch can be easily revoked and reissued which are also unique to the user and can be easily used for identification and verification. In this paper we develop and present a method to generate a set of templates which are fully unique to the individual and also revocable. By using bases set compression algorithms in an n-dimensional orthogonal space we can represent a give biometric image in an infinite number of equally valued and unique ways. The verification and biometric matching system would be presented with a given template and revocation code. The code will then representing where in the sequence of n-dimensional vectors to start the recognition.

  15. Generation of sequence signatures from DNA amplification fingerprints with mini-hairpin and microsatellite primers.

    Science.gov (United States)

    Caetano-Anollés, G; Gresshoff, P M

    1996-06-01

    DNA amplification fingerprinting (DAF) with mini-hairpins harboring arbitrary "core" sequences at their 3' termini were used to fingerprint a variety of templates, including PCR products and whole genomes, to establish genetic relationships between plant tax at the interspecific and intraspecific level, and to identify closely related fungal isolates and plant accessions. No correlation was observed between the sequence of the arbitrary core, the stability of the mini-hairpin structure and DAF efficiency. Mini-hairpin primers with short arbitrary cores and primers complementary to simple sequence repeats present in microsatellites were also used to generate arbitrary signatures from amplification profiles (ASAP). The ASAP strategy is a dual-step amplification procedure that uses at least one primer in each fingerprinting stage. ASAP was able to reproducibly amplify DAF products (representing about 10-15 kb of sequence) following careful optimization of amplification parameters such as primer and template concentration. Avoidance of primer sequences partially complementary to DAF product termini was necessary in order to produce distinct fingerprints. This allowed the combinatorial use of oligomers in nucleic acid screening, with numerous ASAP fingerprinting reactions based on a limited number of primer sequences. Mini-hairpin primers and ASAP analysis significantly increased detection of polymorphic DNA, separating closely related bermudagrass (Cynodon) cultivars and detecting putatively linked markers in bulked segregant analysis of the soybean (Glycine max) supernodulation (nitrate-tolerant symbiosis) locus.

  16. Performance Evaluation of Fusing Protected Fingerprint Minutiae Templates on the Decision Level

    NARCIS (Netherlands)

    Yang, Bian; Busch, C.; Groot, K. de; Xu, H.; Veldhuis, Raymond N.J.

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiers results in a decision testing whether both identifiers are derived from the same biometric

  17. Performance evaluation of fusing protected fingerprint minutiae templates on the decision level

    NARCIS (Netherlands)

    Yang, B.; Groot, K.T.J. de; Christoph Busch; Veldhuis, R.N.J.; Xu, H.

    2013-01-01

    In a biometric authentication system using protected templates, a pseudonymous identifier is the part of a protected template that can be directly compared. Each compared pair of pseudonymous identifiersresults in a decision testing whether both identifiers are derived from the same biometric

  18. New optimized DNA extraction protocol for fingerprints deposited on a special self-adhesive security seal and other latent samples used for human identification.

    Science.gov (United States)

    Kopka, Julieta; Leder, Monika; Jaureguiberry, Stella M; Brem, Gottfried; Boselli, Gabriel O

    2011-09-01

    Obtaining complete short tandem repeat (STR) profiles from fingerprints containing minimal amounts of DNA, using standard extraction techniques, can be difficult. The aim of this study was to evaluate a new kit, Fingerprint DNA Finder (FDF Kit), recently launched for the extraction of DNA and STR profiling from fingerprints placed on a special device known as Self-Adhesive Security Seal Sticker(®) and other latent fingerprints on forensic evidentiary material like metallic guns. The DNA extraction system is based on a reversal of the silica principle, and all the potential inhibiting substances are retained on the surface of a special adsorbent, while nucleic acids are not bound and remain in solution dramatically improving DNA recovery. DNA yield was quite variable among the samples tested, rendering in most of the cases (>90%) complete STR profiles, free of PCR inhibitors, and devoid of artifacts. Even samples with DNA amount below 100 pg could be successfully analyzed. © 2011 American Academy of Forensic Sciences.

  19. Fingerprint Sensors: Liveness Detection Issue and Hardware based Solutions

    Directory of Open Access Journals (Sweden)

    Shahzad Memon

    2012-01-01

    Full Text Available Securing an automated and unsupervised fingerprint recognition system is one of the most critical and challenging tasks in government and commercial applications. In these systems, the detection of liveness of a finger placed on a fingerprint sensor is a major issue that needs to be addressed in order to ensure the credibility of the system. The main focus of this paper is to review the existing fingerprint sensing technologies in terms of liveness detection and discusses hardware based ‘liveness detection’ techniques reported in the literature for automatic fingerprint biometrics.

  20. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Directory of Open Access Journals (Sweden)

    Jin-Won Park

    2009-01-01

    Full Text Available As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  1. Integrating Fingerprint Verification into the Smart Card-Based Healthcare Information System

    Science.gov (United States)

    Moon, Daesung; Chung, Yongwha; Pan, Sung Bum; Park, Jin-Won

    2009-12-01

    As VLSI technology has been improved, a smart card employing 32-bit processors has been released, and more personal information such as medical, financial data can be stored in the card. Thus, it becomes important to protect personal information stored in the card. Verification of the card holder's identity using a fingerprint has advantages over the present practices of Personal Identification Numbers (PINs) and passwords. However, the computational workload of fingerprint verification is much heavier than that of the typical PIN-based solution. In this paper, we consider three strategies to implement fingerprint verification in a smart card environment and how to distribute the modules of fingerprint verification between the smart card and the card reader. We first evaluate the number of instructions of each step of a typical fingerprint verification algorithm, and estimate the execution time of several cryptographic algorithms to guarantee the security/privacy of the fingerprint data transmitted in the smart card with the client-server environment. Based on the evaluation results, we analyze each scenario with respect to the security level and the real-time execution requirements in order to implement fingerprint verification in the smart card with the client-server environment.

  2. Multimodal biometric approach for cancelable face template generation

    Science.gov (United States)

    Paul, Padma Polash; Gavrilova, Marina

    2012-06-01

    Due to the rapid growth of biometric technology, template protection becomes crucial to secure integrity of the biometric security system and prevent unauthorized access. Cancelable biometrics is emerging as one of the best solutions to secure the biometric identification and verification system. We present a novel technique for robust cancelable template generation algorithm that takes advantage of the multimodal biometric using feature level fusion. Feature level fusion of different facial features is applied to generate the cancelable template. A proposed algorithm based on the multi-fold random projection and fuzzy communication scheme is used for this purpose. In cancelable template generation, one of the main difficulties is keeping interclass variance of the feature. We have found that interclass variations of the features that are lost during multi fold random projection can be recovered using fusion of different feature subsets and projecting in a new feature domain. Applying the multimodal technique in feature level, we enhance the interclass variability hence improving the performance of the system. We have tested the system for classifier fusion for different feature subset and different cancelable template fusion. Experiments have shown that cancelable template improves the performance of the biometric system compared with the original template.

  3. Network-based Fingerprint Authentication System Using a Mobile Device

    OpenAIRE

    Zhang, Qihu

    2016-01-01

    Abstract— Fingerprint-based user authentication is highly effective in networked services such as electronic payment, but conventional authentication solutions have problems in cost, usability and security. To resolve these problems, we propose a touch-less fingerprint authentication solution, in which a mobile device's built-in camera is used to capture fingerprint image, and then it is sent to the server to determine the identity of the user. We designed and implemented a prototype as an a...

  4. A Hybrid Approach to Protect Palmprint Templates

    Directory of Open Access Journals (Sweden)

    Hailun Liu

    2014-01-01

    Full Text Available Biometric template protection is indispensable to protect personal privacy in large-scale deployment of biometric systems. Accuracy, changeability, and security are three critical requirements for template protection algorithms. However, existing template protection algorithms cannot satisfy all these requirements well. In this paper, we propose a hybrid approach that combines random projection and fuzzy vault to improve the performances at these three points. Heterogeneous space is designed for combining random projection and fuzzy vault properly in the hybrid scheme. New chaff point generation method is also proposed to enhance the security of the heterogeneous vault. Theoretical analyses of proposed hybrid approach in terms of accuracy, changeability, and security are given in this paper. Palmprint database based experimental results well support the theoretical analyses and demonstrate the effectiveness of proposed hybrid approach.

  5. FINGERPRINT MATCHING BASED ON PORE CENTROIDS

    Directory of Open Access Journals (Sweden)

    S. Malathi

    2011-05-01

    Full Text Available In recent years there has been exponential growth in the use of bio- metrics for user authentication applications. Automated Fingerprint Identification systems have become popular tool in many security and law enforcement applications. Most of these systems rely on minutiae (ridge ending and bifurcation features. With the advancement in sensor technology, high resolution fingerprint images (1000 dpi pro- vide micro level of features (pores that have proven to be useful fea- tures for identification. In this paper, we propose a new strategy for fingerprint matching based on pores by reliably extracting the pore features The extraction of pores is done by Marker Controlled Wa- tershed segmentation method and the centroids of each pore are con- sidered as feature vectors for matching of two fingerprint images. Experimental results shows that the proposed method has better per- formance with lower false rates and higher accuracy.

  6. Spectral Minutiae Representations for Fingerprint Recognition

    OpenAIRE

    Xu, H.

    2010-01-01

    Nowadays, biometric technology is increasingly deployed in civil and commercial applications. The growing use of biometrics is raising security and privacy concerns about the biometric technology. Storing biometric data, known as biometric templates, in a database leads to several privacy risks such as identity fraud and cross matching. A solution is to apply biometric template protection techniques, which aim to make it impossible to recover the biometric data from the templates. The researc...

  7. Fingerprint: A Unique and Reliable Method for Identification

    Directory of Open Access Journals (Sweden)

    Palash Kumar Bose

    2017-01-01

    Full Text Available Fingerprints have been the gold standard for personal identification within the forensic community for more than one hundred years. It is still universal in spite of discovery of DNA fingerprint. The science of fingerprint identification has evolved over time from the early use of finger prints to mark business transactions in ancient Babylonia to their use today as core technology in biometric security devices and as scientific evidence in courts of law throughout the world. The science of fingerprints, dactylography or dermatoglyphics, had long been widely accepted, and well acclaimed and reputed as panacea for individualization, particularly in forensic investigations. Human fingerprints are detailed, unique, difficult to alter, and durable over the life of an individual, making them suitable as lifelong markers of human identity. Fingerprints can be readily used by police or other authorities to identify individuals who wish to conceal their identity, or to identify people who are incapacitated or deceased, as in the aftermath of a natural disaster

  8. Enhancing the Security of Customer Data in Cloud Environments Using a Novel Digital Fingerprinting Technique

    Directory of Open Access Journals (Sweden)

    Nithya Chidambaram

    2016-01-01

    Full Text Available With the rapid rise of the Internet and electronics in people’s life, the data related to it has also undergone a mammoth increase in magnitude. The data which is stored in the cloud can be sensitive and at times needs a proper file storage system with a tough security algorithm. Whereas cloud is an open shareable elastic environment, it needs impenetrable and airtight security. This paper deals with furnishing a secure storage system for the above-mentioned purpose in the cloud. To become eligible to store data a user has to register with the cloud database. This prevents unauthorized access. The files stored in the cloud are encrypted with RSA algorithm and digital fingerprint for the same has been generated through MD5 message digest before storage. The RSA provides unreadability of data to anyone without the private key. MD5 makes it impossible for any changes on data to go unnoticed. After the application of RSA and MD5 before storage, the data becomes resistant to access or modifications by any third party and to intruders of cloud storage system. This application is tested in Amazon Elastic Compute Cloud Web Services.

  9. Three-dimensional imaging of artificial fingerprint by optical coherence tomography

    Science.gov (United States)

    Larin, Kirill V.; Cheng, Yezeng

    2008-03-01

    Fingerprint recognition is one of the popular used methods of biometrics. However, due to the surface topography limitation, fingerprint recognition scanners are easily been spoofed, e.g. using artificial fingerprint dummies. Thus, biometric fingerprint identification devices need to be more accurate and secure to deal with different fraudulent methods including dummy fingerprints. Previously, we demonstrated that Optical Coherence Tomography (OCT) images revealed the presence of the artificial fingerprints (made from different household materials, such as cement and liquid silicone rubber) at all times, while the artificial fingerprints easily spoofed the commercial fingerprint reader. Also we demonstrated that an analysis of the autocorrelation of the OCT images could be used in automatic recognition systems. Here, we exploited the three-dimensional (3D) imaging of the artificial fingerprint by OCT to generate vivid 3D image for both the artificial fingerprint layer and the real fingerprint layer beneath. With the reconstructed 3D image, it could not only point out whether there exists an artificial material, which is intended to spoof the scanner, above the real finger, but also could provide the hacker's fingerprint. The results of these studies suggested that Optical Coherence Tomography could be a powerful real-time noninvasive method for accurate identification of artificial fingerprints real fingerprints as well.

  10. Evaluation of the feasibility of security technologies in teleradiology as biometric fingerprint scanners for data exchange over a satellite WAN

    Science.gov (United States)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    We evaluated the feasibility of fingerprint-scanners in combination with smart cards for personal identification and transmission of encrypted TCP/IP-data-packages via satellite between the university-hospital of Innsbruck and the rural hospital of Reutte. The aim of our study was the proof of the userfriendliness of the SkymedTM technology for security purpose in teleradiology. We examined the time of the personal identification process, the time for the necessary training and the personal satisfaction. The images were sent from the local PACS in Reutte via a Data-Encryption-and-Transmission- Box via satellite from Reutte to Innsbruck. We used an asymmetric bandwidth of 512 kbit/s from Reutte to Innsbruck and 128 kbit/s in the opposite direction. Window NT 4.0- operating PCs were used for the electronical patient record, the medical inquiry of the referring physician and the final report of the radiologist. The images were reported on an UNIX-PACS viewing station. After identification through fingerprint-scanners in combination with the smart card the radiologist was able to open the electronic patient record (EPR) from Reutte and sign with his digital signature his confirmed final report before it was send back to Reutte. The used security technology enables encrypted communication over a WAN, which fulfill data-protection.

  11. Method for modeling post-mortem biometric 3D fingerprints

    Science.gov (United States)

    Rajeev, Srijith; Shreyas, Kamath K. M.; Agaian, Sos S.

    2016-05-01

    Despite the advancements of fingerprint recognition in 2-D and 3-D domain, authenticating deformed/post-mortem fingerprints continue to be an important challenge. Prior cleansing and reconditioning of the deceased finger is required before acquisition of the fingerprint. The victim's finger needs to be precisely and carefully operated by a medium to record the fingerprint impression. This process may damage the structure of the finger, which subsequently leads to higher false rejection rates. This paper proposes a non-invasive method to perform 3-D deformed/post-mortem finger modeling, which produces a 2-D rolled equivalent fingerprint for automated verification. The presented novel modeling method involves masking, filtering, and unrolling. Computer simulations were conducted on finger models with different depth variations obtained from Flashscan3D LLC. Results illustrate that the modeling scheme provides a viable 2-D fingerprint of deformed models for automated verification. The quality and adaptability of the obtained unrolled 2-D fingerprints were analyzed using NIST fingerprint software. Eventually, the presented method could be extended to other biometric traits such as palm, foot, tongue etc. for security and administrative applications.

  12. Fingerprint recognition with identical twin fingerprints.

    Science.gov (United States)

    Tao, Xunqiang; Chen, Xinjian; Yang, Xin; Tian, Jie

    2012-01-01

    Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6) images. Compared to the previous work, our contributions are summarized as follows: (1) Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2) Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3) A larger sample (83 pairs) was collected. (4) A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5) A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a) A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b) The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c) For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d) For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  13. Fingerprint recognition with identical twin fingerprints.

    Directory of Open Access Journals (Sweden)

    Xunqiang Tao

    Full Text Available Fingerprint recognition with identical twins is a challenging task due to the closest genetics-based relationship existing in the identical twins. Several pioneers have analyzed the similarity between twins' fingerprints. In this work we continue to investigate the topic of the similarity of identical twin fingerprints. Our study was tested based on a large identical twin fingerprint database that contains 83 twin pairs, 4 fingers per individual and six impressions per finger: 3984 (83*2*4*6 images. Compared to the previous work, our contributions are summarized as follows: (1 Two state-of-the-art fingerprint identification methods: P071 and VeriFinger 6.1 were used, rather than one fingerprint identification method in previous studies. (2 Six impressions per finger were captured, rather than just one impression, which makes the genuine distribution of matching scores more realistic. (3 A larger sample (83 pairs was collected. (4 A novel statistical analysis, which aims at showing the probability distribution of the fingerprint types for the corresponding fingers of identical twins which have same fingerprint type, has been conducted. (5 A novel analysis, which aims at showing which finger from identical twins has higher probability of having same fingerprint type, has been conducted. Our results showed that: (a A state-of-the-art automatic fingerprint verification system can distinguish identical twins without drastic degradation in performance. (b The chance that the fingerprints have the same type from identical twins is 0.7440, comparing to 0.3215 from non-identical twins. (c For the corresponding fingers of identical twins which have same fingerprint type, the probability distribution of five major fingerprint types is similar to the probability distribution for all the fingers' fingerprint type. (d For each of four fingers of identical twins, the probability of having same fingerprint type is similar.

  14. THE INVESTIGATION OF THE RELATIONSHIP BETWEEN FINGERPRINT PATTERNS AND CRIME TYPES

    OpenAIRE

    DELİCE, Murat; DUMAN, Ali; ÖZEL, Şaban Ali

    2014-01-01

    The exclusivity of prints at the tip of each individuals fingers is known for thousands of years and these prints are used for security purposes for a long time. Recent developments have pointed out that fingerprint patterns are related to gender, heredity, diseases, blood types and even character. However, the relationship between fingerprint patterns and crime types has not been explored. In order to meet this need, this research study examines the fingerprint patterns of suspects who are i...

  15. A study on user authentication methodology using numeric password and fingerprint biometric information.

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol; Kwak, Jin

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  16. A STUDY ON MULTIFACTOR AUTHENTICATION MODEL USING FINGERPRINT HASH CODE, PASSWORD AND OTP

    OpenAIRE

    K. Krishna Prasad; P. S. Aithal

    2018-01-01

    By definition, Authentication is using one or multiple mechanisms to show that you are who you claim to be. As soon as the identity of the human or machine is demonstrated, then human or machine is authorized to grant some services. The modern research study reveals that fingerprint is not so secured like secured a password which consists of alphanumeric characters, number and special characters. Fingerprints are left at crime places, on materials or at the door which is usually class of late...

  17. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Directory of Open Access Journals (Sweden)

    Seung-hwan Ju

    2013-01-01

    Full Text Available The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility.

  18. A Study on User Authentication Methodology Using Numeric Password and Fingerprint Biometric Information

    Science.gov (United States)

    Ju, Seung-hwan; Seo, Hee-suk; Han, Sung-hyu; Ryou, Jae-cheol

    2013-01-01

    The prevalence of computers and the development of the Internet made us able to easily access information. As people are concerned about user information security, the interest of the user authentication method is growing. The most common computer authentication method is the use of alphanumerical usernames and passwords. The password authentication systems currently used are easy, but only if you know the password, as the user authentication is vulnerable. User authentication using fingerprints, only the user with the information that is specific to the authentication security is strong. But there are disadvantage such as the user cannot change the authentication key. In this study, we proposed authentication methodology that combines numeric-based password and biometric-based fingerprint authentication system. Use the information in the user's fingerprint, authentication keys to obtain security. Also, using numeric-based password can to easily change the password; the authentication keys were designed to provide flexibility. PMID:24151601

  19. Optical image encryption using QR code and multilevel fingerprints in gyrator transform domains

    Science.gov (United States)

    Wei, Yang; Yan, Aimin; Dong, Jiabin; Hu, Zhijuan; Zhang, Jingtao

    2017-11-01

    A new concept of GT encryption scheme is proposed in this paper. We present a novel optical image encryption method by using quick response (QR) code and multilevel fingerprint keys in gyrator transform (GT) domains. In this method, an original image is firstly transformed into a QR code, which is placed in the input plane of cascaded GTs. Subsequently, the QR code is encrypted into the cipher-text by using multilevel fingerprint keys. The original image can be obtained easily by reading the high-quality retrieved QR code with hand-held devices. The main parameters used as private keys are GTs' rotation angles and multilevel fingerprints. Biometrics and cryptography are integrated with each other to improve data security. Numerical simulations are performed to demonstrate the validity and feasibility of the proposed encryption scheme. In the future, the method of applying QR codes and fingerprints in GT domains possesses much potential for information security.

  20. A Fingerprint Image Encryption Scheme Based on Hyperchaotic Rössler Map

    Directory of Open Access Journals (Sweden)

    F. Abundiz-Pérez

    2016-01-01

    Full Text Available Currently, biometric identifiers have been used to identify or authenticate users in a biometric system to increase the security in access control systems. Nevertheless, there are several attacks on the biometric system to steal and recover the user’s biometric trait. One of the most powerful attacks is extracting the fingerprint pattern when it is transmitted over communication lines between modules. In this paper, we present a novel fingerprint image encryption scheme based on hyperchaotic Rössler map to provide high security and secrecy in user’s biometric trait, avoid identity theft, and increase the robustness of the biometric system. A complete security analysis is presented to justify the secrecy of the biometric trait by using our proposed scheme at statistical level with 100% of NPCR, low correlation, and uniform histograms. Therefore, it can be used in secure biometric access control systems.

  1. Secure and Robust Iris Recognition Using Random Projections and Sparse Representations.

    Science.gov (United States)

    Pillai, Jaishanker K; Patel, Vishal M; Chellappa, Rama; Ratha, Nalini K

    2011-09-01

    Noncontact biometrics such as face and iris have additional benefits over contact-based biometrics such as fingerprint and hand geometry. However, three important challenges need to be addressed in a noncontact biometrics-based authentication system: ability to handle unconstrained acquisition, robust and accurate matching, and privacy enhancement without compromising security. In this paper, we propose a unified framework based on random projections and sparse representations, that can simultaneously address all three issues mentioned above in relation to iris biometrics. Our proposed quality measure can handle segmentation errors and a wide variety of possible artifacts during iris acquisition. We demonstrate how the proposed approach can be easily extended to handle alignment variations and recognition from iris videos, resulting in a robust and accurate system. The proposed approach includes enhancements to privacy and security by providing ways to create cancelable iris templates. Results on public data sets show significant benefits of the proposed approach.

  2. A lightweight approach for biometric template protection

    Science.gov (United States)

    Al-Assam, Hisham; Sellahewa, Harin; Jassim, Sabah

    2009-05-01

    Privacy and security are vital concerns for practical biometric systems. The concept of cancelable or revocable biometrics has been proposed as a solution for biometric template security. Revocable biometric means that biometric templates are no longer fixed over time and could be revoked in the same way as lost or stolen credit cards are. In this paper, we describe a novel and an efficient approach to biometric template protection that meets the revocability property. This scheme can be incorporated into any biometric verification scheme while maintaining, if not improving, the accuracy of the original biometric system. However, we shall demonstrate the result of applying such transforms on face biometric templates and compare the efficiency of our approach with that of the well-known random projection techniques. We shall also present the results of experimental work on recognition accuracy before and after applying the proposed transform on feature vectors that are generated by wavelet transforms. These results are based on experiments conducted on a number of well-known face image databases, e.g. Yale and ORL databases.

  3. Evaluation of fingerprint deformation using optical coherence tomography

    Science.gov (United States)

    Gutierrez da Costa, Henrique S.; Maxey, Jessica R.; Silva, Luciano; Ellerbee, Audrey K.

    2014-02-01

    Biometric identification systems have important applications to privacy and security. The most widely used of these, print identification, is based on imaging patterns present in the fingers, hands and feet that are formed by the ridges, valleys and pores of the skin. Most modern print sensors acquire images of the finger when pressed against a sensor surface. Unfortunately, this pressure may result in deformations, characterized by changes in the sizes and relative distances of the print patterns, and such changes have been shown to negatively affect the performance of fingerprint identification algorithms. Optical coherence tomography (OCT) is a novel imaging technique that is capable of imaging the subsurface of biological tissue. Hence, OCT may be used to obtain images of subdermal skin structures from which one can extract an internal fingerprint. The internal fingerprint is very similar in structure to the commonly used external fingerprint and is of increasing interest in investigations of identify fraud. We proposed and tested metrics based on measurements calculated from external and internal fingerprints to evaluate the amount of deformation of the skin. Such metrics were used to test hypotheses about the differences of deformation between the internal and external images, variations with the type of finger and location inside the fingerprint.

  4. Uniform Local Binary Pattern for Fingerprint Liveness Detection in the Gaussian Pyramid

    Directory of Open Access Journals (Sweden)

    Yujia Jiang

    2018-01-01

    Full Text Available Fingerprint recognition schemas are widely used in our daily life, such as Door Security, Identification, and Phone Verification. However, the existing problem is that fingerprint recognition systems are easily tricked by fake fingerprints for collaboration. Therefore, designing a fingerprint liveness detection module in fingerprint recognition systems is necessary. To solve the above problem and discriminate true fingerprint from fake ones, a novel software-based liveness detection approach using uniform local binary pattern (ULBP in spatial pyramid is applied to recognize fingerprint liveness in this paper. Firstly, preprocessing operation for each fingerprint is necessary. Then, to solve image rotation and scale invariance, three-layer spatial pyramids of fingerprints are introduced in this paper. Next, texture information for three layers spatial pyramids is described by using uniform local binary pattern to extract features of given fingerprints. The accuracy of our proposed method has been compared with several state-of-the-art methods in fingerprint liveness detection. Experiments based on standard databases, taken from Liveness Detection Competition 2013 composed of four different fingerprint sensors, have been carried out. Finally, classifier model based on extracted features is trained using SVM classifier. Experimental results present that our proposed method can achieve high recognition accuracy compared with other methods.

  5. Template protection and its implementation in 3D face recognition systems

    Science.gov (United States)

    Zhou, Xuebing

    2007-04-01

    As biometric recognition systems are widely applied in various application areas, security and privacy risks have recently attracted the attention of the biometric community. Template protection techniques prevent stored reference data from revealing private biometric information and enhance the security of biometrics systems against attacks such as identity theft and cross matching. This paper concentrates on a template protection algorithm that merges methods from cryptography, error correction coding and biometrics. The key component of the algorithm is to convert biometric templates into binary vectors. It is shown that the binary vectors should be robust, uniformly distributed, statistically independent and collision-free so that authentication performance can be optimized and information leakage can be avoided. Depending on statistical character of the biometric template, different approaches for transforming biometric templates into compact binary vectors are presented. The proposed methods are integrated into a 3D face recognition system and tested on the 3D facial images of the FRGC database. It is shown that the resulting binary vectors provide an authentication performance that is similar to the original 3D face templates. A high security level is achieved with reasonable false acceptance and false rejection rates of the system, based on an efficient statistical analysis. The algorithm estimates the statistical character of biometric templates from a number of biometric samples in the enrollment database. For the FRGC 3D face database, the small distinction of robustness and discriminative power between the classification results under the assumption of uniquely distributed templates and the ones under the assumption of Gaussian distributed templates is shown in our tests.

  6. Efficiency and Flexibility of Fingerprint Scheme Using Partial Encryption and Discrete Wavelet Transform to Verify User in Cloud Computing.

    Science.gov (United States)

    Yassin, Ali A

    2014-01-01

    Now, the security of digital images is considered more and more essential and fingerprint plays the main role in the world of image. Furthermore, fingerprint recognition is a scheme of biometric verification that applies pattern recognition techniques depending on image of fingerprint individually. In the cloud environment, an adversary has the ability to intercept information and must be secured from eavesdroppers. Unluckily, encryption and decryption functions are slow and they are often hard. Fingerprint techniques required extra hardware and software; it is masqueraded by artificial gummy fingers (spoof attacks). Additionally, when a large number of users are being verified at the same time, the mechanism will become slow. In this paper, we employed each of the partial encryptions of user's fingerprint and discrete wavelet transform to obtain a new scheme of fingerprint verification. Moreover, our proposed scheme can overcome those problems; it does not require cost, reduces the computational supplies for huge volumes of fingerprint images, and resists well-known attacks. In addition, experimental results illustrate that our proposed scheme has a good performance of user's fingerprint verification.

  7. Secure and Usable Out-Of-Band Channels for Ad Hoc Mobile Device Interactions

    OpenAIRE

    Kainda , Ronald; Flechais , Ivan; Roscoe , A. W.

    2010-01-01

    International audience; Protocols for bootstrapping security in ad hoc mobile device interactions rely on users' ability to perform specific tasks such as transferring or comparing fingerprints of information between devices. The size of fingerprints depends on the level of technical security required by a given application but, at the same time, is limited by users' inability to deal with large amounts of data with high levels of accuracy. Large fingerprints provide high technical security b...

  8. Damage invariant and high security acquisition of the internal fingerprint using optical coherence tomography

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-11-01

    Full Text Available representation they offer. Using an emerging fingerprint acquisition technology – optical coherence tomography – to access an internal fingerprint under the skin surface, this paper serves to address two limitations of conventional scanners: fingertip skin damage...

  9. Biometric Template Security

    OpenAIRE

    Abhishek Nagar; Karthik Nandakumar; Anil K. Jain

    2008-01-01

    Biometric recognition offers a reliable solution to the problem of user authentication in identity management systems. With the widespread deployment of biometric systems in various applications, there are increasing concerns about the security and privacy of biometric technology. Public acceptance of biometrics technology will depend on the ability of system designers to demonstrate that these systems are robust, have low error rates, and are tamper proof. We present a high-level categorizat...

  10. The Evolution of the Automated Continuous Evaluation System (ACES) for Personnel Security

    Science.gov (United States)

    2013-11-12

    to capture and transmit fingerprints . • Accurate Biometrics , a commercial Livescan fingerprinting provider, also received fingerprints electronically...FOUO). Monterey, CA: Defense Personnel Security Research Center. Herbig, K. L. (2008). Changes in espionage by American citizens , 1947-2007. (Tech...by American citizens , 1947-2001. (Tech. Rep. 02-05). Monterey, CA: Defense Personnel Security Research Center. Heuer, Jr., R. J., Crawford, K. S

  11. A relation between irreversibility and unlinkability for biometric template protection algorithms

    OpenAIRE

    井沼, 学

    2014-01-01

    For biometric recognition systems, privacy protection of enrolled users’ biometric information, which are called biometric templates, is a critical problem. Recently, various template protection algorithms have been proposed and many related previous works have discussed security notions to evaluate the protection performance of these protection algorithms. Irreversibility and unlinkability are important security notions discussed in many related previous works. In this paper, we prove that u...

  12. The spectroscopic detection of drugs of abuse in fingerprints after development with powders and recovery with adhesive lifters

    OpenAIRE

    West, M.J.; Went, Michael J.

    2009-01-01

    The application of powders to fingerprints has long been established as an effective and reliable method\\ud for developing latent fingerprints. Fingerprints developed in situ at a crime scene routinely undergo lifting\\ud with specialist tapes and are then stored in evidence bags to allow secure transit and also to preserve the\\ud chain of evidence. In a previous study we have shown that exogenous material within a fingerprint can\\ud be detected using Raman spectroscopy following development w...

  13. 78 FR 73868 - Privacy Act of 1974; Department of Homeland Security Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-12-09

    ... security screening and identity verification of individuals, including identification media and identifying... undergoing screening of their person (including identity verification) or property; individuals against whom... addresses, phone numbers); Social Security Number, Fingerprints or other biometric identifiers; Photographs...

  14. Spectral Minutiae Representations for Fingerprint Recognition

    NARCIS (Netherlands)

    Xu, H.

    2010-01-01

    Nowadays, biometric technology is increasingly deployed in civil and commercial applications. The growing use of biometrics is raising security and privacy concerns about the biometric technology. Storing biometric data, known as biometric templates, in a database leads to several privacy risks such

  15. Evaluation of a single-pixel one-transistor active pixel sensor for fingerprint imaging

    Science.gov (United States)

    Xu, Man; Ou, Hai; Chen, Jun; Wang, Kai

    2015-08-01

    Since it first appeared in iPhone 5S in 2013, fingerprint identification (ID) has rapidly gained popularity among consumers. Current fingerprint-enabled smartphones unanimously consists of a discrete sensor to perform fingerprint ID. This architecture not only incurs higher material and manufacturing cost, but also provides only static identification and limited authentication. Hence as the demand for a thinner, lighter, and more secure handset grows, we propose a novel pixel architecture that is a photosensitive device embedded in a display pixel and detects the reflected light from the finger touch for high resolution, high fidelity and dynamic biometrics. To this purpose, an amorphous silicon (a-Si:H) dual-gate photo TFT working in both fingerprint-imaging mode and display-driving mode will be developed.

  16. Analytical template protection performance and maximum key size given a Gaussian-modeled biometric source

    NARCIS (Netherlands)

    Kelkboom, E.J.C.; Breebaart, Jeroen; Buhan, I.R.; Veldhuis, Raymond N.J.; Vijaya Kumar, B.V.K.; Prabhakar, Salil; Ross, Arun A.

    2010-01-01

    Template protection techniques are used within biometric systems in order to protect the stored biometric template against privacy and security threats. A great portion of template protection techniques are based on extracting a key from or binding a key to a biometric sample. The achieved

  17. Advanced Fingerprint Analysis Project Fingerprint Constituents

    Energy Technology Data Exchange (ETDEWEB)

    GM Mong; CE Petersen; TRW Clauss

    1999-10-29

    The work described in this report was focused on generating fundamental data on fingerprint components which will be used to develop advanced forensic techniques to enhance fluorescent detection, and visualization of latent fingerprints. Chemical components of sweat gland secretions are well documented in the medical literature and many chemical techniques are available to develop latent prints, but there have been no systematic forensic studies of fingerprint sweat components or of the chemical and physical changes these substances undergo over time.

  18. Device for biometric verification of maternity

    OpenAIRE

    Lalović Komlen; Milosavljević Milan; Tot Ivan; Maček Nemanja

    2015-01-01

    Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that refere...

  19. On the feasibility of device fingerprinting in industrial control systems

    NARCIS (Netherlands)

    Caselli, M.; Hadziosmanovic, D.; Zambon, Emmanuele; Kargl, Frank; Luiijf, Eric; Hartel, Pieter H.

    2013-01-01

    As Industrial Control Systems (ICS) and standard IT networks are becoming one heterogeneous entity, there has been an increasing effort in adjusting common security tools and methodologies to fit the industrial environment. Fingerprinting of industrial devices is still an unexplored research field.

  20. Biometric template data protection in mobile device environment using XML-database

    DEFF Research Database (Denmark)

    Thirumathyam, Rubathas; Derawi, Mohammad; Fischer, Paul

    2010-01-01

    recognition or gait recognition. To gain a real understanding of how it is possible to protect the biometric data, this paper first starts out with introducing a technique for security in a biometric system and emphasizes that template protection is important by going through the vulnerabilities and threats....... Furthermore, it points out requirements for template protection, a recital of various template protection schemes and a brief overview of biometric standards....

  1. 75 FR 24932 - Privacy Act of 1974; System of Records

    Science.gov (United States)

    2010-05-06

    ... following methods: Federal Rulemaking Portal: http://www.regulations.gov . Follow the instructions for... use of biometric databases and associated data processing/ information services for designated... media. RETRIEVABILITY: Name, Social Security Number (SSN), biometric template, (fingerprints, face and...

  2. Typing DNA profiles from previously enhanced fingerprints using direct PCR.

    Science.gov (United States)

    Templeton, Jennifer E L; Taylor, Duncan; Handt, Oliva; Linacre, Adrian

    2017-07-01

    Fingermarks are a source of human identification both through the ridge patterns and DNA profiling. Typing nuclear STR DNA markers from previously enhanced fingermarks provides an alternative method of utilising the limited fingermark deposit that can be left behind during a criminal act. Dusting with fingerprint powders is a standard method used in classical fingermark enhancement and can affect DNA data. The ability to generate informative DNA profiles from powdered fingerprints using direct PCR swabs was investigated. Direct PCR was used as the opportunity to generate usable DNA profiles after performing any of the standard DNA extraction processes is minimal. Omitting the extraction step will, for many samples, be the key to success if there is limited sample DNA. DNA profiles were generated by direct PCR from 160 fingermarks after treatment with one of the following dactyloscopic fingerprint powders: white hadonite; silver aluminium; HiFi Volcano silk black; or black magnetic fingerprint powder. This was achieved by a combination of an optimised double-swabbing technique and swab media, omission of the extraction step to minimise loss of critical low-template DNA, and additional AmpliTaq Gold ® DNA polymerase to boost the PCR. Ninety eight out of 160 samples (61%) were considered 'up-loadable' to the Australian National Criminal Investigation DNA Database (NCIDD). The method described required a minimum of working steps, equipment and reagents, and was completed within 4h. Direct PCR allows the generation of DNA profiles from enhanced prints without the need to increase PCR cycle numbers beyond manufacturer's recommendations. Particular emphasis was placed on preventing contamination by applying strict protocols and avoiding the use of previously used fingerprint brushes. Based on this extensive survey, the data provided indicate minimal effects of any of these four powders on the chance of obtaining DNA profiles from enhanced fingermarks. Copyright © 2017

  3. Towards secondary fingerprint classification

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-07-01

    Full Text Available an accuracy figure of 76.8%. This small difference between the two figures is indicative of the validity of the proposed secondary classification module. Keywords?fingerprint core; fingerprint delta; primary classifi- cation; secondary classification I..., namely, the fingerprint core and the fingerprint delta. Forensically, a fingerprint core is defined as the innermost turning point where the fingerprint ridges form a loop, while the fingerprint delta is defined as the point where these ridges form a...

  4. Multiscale reconstruction for MR fingerprinting.

    Science.gov (United States)

    Pierre, Eric Y; Ma, Dan; Chen, Yong; Badve, Chaitra; Griswold, Mark A

    2016-06-01

    To reduce the acquisition time needed to obtain reliable parametric maps with Magnetic Resonance Fingerprinting. An iterative-denoising algorithm is initialized by reconstructing the MRF image series at low image resolution. For subsequent iterations, the method enforces pixel-wise fidelity to the best-matching dictionary template then enforces fidelity to the acquired data at slightly higher spatial resolution. After convergence, parametric maps with desirable spatial resolution are obtained through template matching of the final image series. The proposed method was evaluated on phantom and in vivo data using the highly undersampled, variable-density spiral trajectory and compared with the original MRF method. The benefits of additional sparsity constraints were also evaluated. When available, gold standard parameter maps were used to quantify the performance of each method. The proposed approach allowed convergence to accurate parametric maps with as few as 300 time points of acquisition, as compared to 1000 in the original MRF work. Simultaneous quantification of T1, T2, proton density (PD), and B0 field variations in the brain was achieved in vivo for a 256 × 256 matrix for a total acquisition time of 10.2 s, representing a three-fold reduction in acquisition time. The proposed iterative multiscale reconstruction reliably increases MRF acquisition speed and accuracy. Magn Reson Med 75:2481-2492, 2016. © 2015 Wiley Periodicals, Inc. © 2015 Wiley Periodicals, Inc.

  5. Multiscale Reconstruction for Magnetic Resonance Fingerprinting

    Science.gov (United States)

    Pierre, Eric Y.; Ma, Dan; Chen, Yong; Badve, Chaitra; Griswold, Mark A.

    2015-01-01

    Purpose To reduce acquisition time needed to obtain reliable parametric maps with Magnetic Resonance Fingerprinting. Methods An iterative-denoising algorithm is initialized by reconstructing the MRF image series at low image resolution. For subsequent iterations, the method enforces pixel-wise fidelity to the best-matching dictionary template then enforces fidelity to the acquired data at slightly higher spatial resolution. After convergence, parametric maps with desirable spatial resolution are obtained through template matching of the final image series. The proposed method was evaluated on phantom and in-vivo data using the highly-undersampled, variable-density spiral trajectory and compared with the original MRF method. The benefits of additional sparsity constraints were also evaluated. When available, gold standard parameter maps were used to quantify the performance of each method. Results The proposed approach allowed convergence to accurate parametric maps with as few as 300 time points of acquisition, as compared to 1000 in the original MRF work. Simultaneous quantification of T1, T2, proton density (PD) and B0 field variations in the brain was achieved in vivo for a 256×256 matrix for a total acquisition time of 10.2s, representing a 3-fold reduction in acquisition time. Conclusions The proposed iterative multiscale reconstruction reliably increases MRF acquisition speed and accuracy. PMID:26132462

  6. Securing health sensing using integrated circuit metric.

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-10-20

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware "fingerprints". The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  7. A novel chaotic stream cipher and its application to palmprint template protection

    International Nuclear Information System (INIS)

    Heng-Jian, Li; Jia-Shu, Zhang

    2010-01-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher. (general)

  8. A novel chaotic stream cipher and its application to palmprint template protection

    Science.gov (United States)

    Li, Heng-Jian; Zhang, Jia-Shu

    2010-04-01

    Based on a coupled nonlinear dynamic filter (NDF), a novel chaotic stream cipher is presented in this paper and employed to protect palmprint templates. The chaotic pseudorandom bit generator (PRBG) based on a coupled NDF, which is constructed in an inverse flow, can generate multiple bits at one iteration and satisfy the security requirement of cipher design. Then, the stream cipher is employed to generate cancelable competitive code palmprint biometrics for template protection. The proposed cancelable palmprint authentication system depends on two factors: the palmprint biometric and the password/token. Therefore, the system provides high-confidence and also protects the user's privacy. The experimental results of verification on the Hong Kong PolyU Palmprint Database show that the proposed approach has a large template re-issuance ability and the equal error rate can achieve 0.02%. The performance of the palmprint template protection scheme proves the good practicability and security of the proposed stream cipher.

  9. Security enhanced BioEncoding for protecting iris codes

    Science.gov (United States)

    Ouda, Osama; Tsumura, Norimichi; Nakaguchi, Toshiya

    2011-06-01

    Improving the security of biometric template protection techniques is a key prerequisite for the widespread deployment of biometric technologies. BioEncoding is a recently proposed template protection scheme, based on the concept of cancelable biometrics, for protecting biometric templates represented as binary strings such as iris codes. The main advantage of BioEncoding over other template protection schemes is that it does not require user-specific keys and/or tokens during verification. Besides, it satisfies all the requirements of the cancelable biometrics construct without deteriorating the matching accuracy. However, although it has been shown that BioEncoding is secure enough against simple brute-force search attacks, the security of BioEncoded templates against more smart attacks, such as record multiplicity attacks, has not been sufficiently investigated. In this paper, a rigorous security analysis of BioEncoding is presented. Firstly, resistance of BioEncoded templates against brute-force attacks is revisited thoroughly. Secondly, we show that although the cancelable transformation employed in BioEncoding might be non-invertible for a single protected template, the original iris code could be inverted by correlating several templates used in different applications but created from the same iris. Accordingly, we propose an important modification to the BioEncoding transformation process in order to hinder attackers from exploiting this type of attacks. The effectiveness of adopting the suggested modification is validated and its impact on the matching accuracy is investigated empirically using CASIA-IrisV3-Interval dataset. Experimental results confirm the efficacy of the proposed approach and show that it preserves the matching accuracy of the unprotected iris recognition system.

  10. Optical Security System Based on the Biometrics Using Holographic Storage Technique with a Simple Data Format

    Science.gov (United States)

    Jun, An Won

    2006-01-01

    We implement a first practical holographic security system using electrical biometrics that combines optical encryption and digital holographic memory technologies. Optical information for identification includes a picture of face, a name, and a fingerprint, which has been spatially multiplexed by random phase mask used for a decryption key. For decryption in our biometric security system, a bit-error-detection method that compares the digital bit of live fingerprint with of fingerprint information extracted from hologram is used.

  11. Enhanced way of securing automated teller machine to track the misusers using secure monitor tracking analysis

    Science.gov (United States)

    Sadhasivam, Jayakumar; Alamelu, M.; Radhika, R.; Ramya, S.; Dharani, K.; Jayavel, Senthil

    2017-11-01

    Now a days the people's attraction towards Automated Teller Machine(ATM) has been increasing even in rural areas. As of now the security provided by all the bank is ATM pin number. Hackers know the way to easily identify the pin number and withdraw money if they haven stolen the ATM card. Also, the Automated Teller Machine is broken and the money is stolen. To overcome these disadvantages, we propose an approach “Automated Secure Tracking System” to secure and tracking the changes in ATM. In this approach, while creating the bank account, the bank should scan the iris known (a part or movement of our eye) and fingerprint of the customer. The scanning can be done with the position of the eye movements and fingerprints identified with the shortest measurements. When the card is swiped then ATM should request the pin, scan the iris and recognize the fingerprint and then allow the customer to withdraw money. If somebody tries to break the ATM an alert message is given to the nearby police station and the ATM shutter is automatically closed. This helps in avoiding the hackers who withdraw money by stealing the ATM card and also helps the government in identifying the criminals easily.

  12. Iris Cryptography for Security Purpose

    Science.gov (United States)

    Ajith, Srighakollapu; Balaji Ganesh Kumar, M.; Latha, S.; Samiappan, Dhanalakshmi; Muthu, P.

    2018-04-01

    In today's world, the security became the major issue to every human being. A major issue is hacking as hackers are everywhere, as the technology was developed still there are many issues where the technology fails to meet the security. Engineers, scientists were discovering the new products for security purpose as biometrics sensors like face recognition, pattern recognition, gesture recognition, voice authentication etcetera. But these devices fail to reach the expected results. In this work, we are going to present an approach to generate a unique secure key using the iris template. Here the iris templates are processed using the well-defined processing techniques. Using the encryption and decryption process they are stored, traversed and utilized. As of the work, we can conclude that the iris cryptography gives us the expected results for securing the data from eavesdroppers.

  13. Touchless fingerprint biometrics

    CERN Document Server

    Labati, Ruggero Donida; Scotti, Fabio

    2015-01-01

    Offering the first comprehensive analysis of touchless fingerprint-recognition technologies, Touchless Fingerprint Biometrics gives an overview of the state of the art and describes relevant industrial applications. It also presents new techniques to efficiently and effectively implement advanced solutions based on touchless fingerprinting.The most accurate current biometric technologies in touch-based fingerprint-recognition systems require a relatively high level of user cooperation to acquire samples of the concerned biometric trait. With the potential for reduced constraints, reduced hardw

  14. Multimodal Authentication Techniques For Staff Identification And ...

    African Journals Online (AJOL)

    PROF. OLIVER OSUAGWA

    2014-12-01

    Dec 1, 2014 ... securing and protecting our identity and valuable data have become areas of great concern ... authentication, verification, tracking and identification systems. It helps to ... managing access while protecting both the ..... Microsoft Operating System XP/Vista, ... range support of fingerprint readers and template.

  15. Longitudinal study of fingerprint recognition.

    Science.gov (United States)

    Yoon, Soweon; Jain, Anil K

    2015-07-14

    Human identification by fingerprints is based on the fundamental premise that ridge patterns from distinct fingers are different (uniqueness) and a fingerprint pattern does not change over time (persistence). Although the uniqueness of fingerprints has been investigated by developing statistical models to estimate the probability of error in comparing two random samples of fingerprints, the persistence of fingerprints has remained a general belief based on only a few case studies. In this study, fingerprint match (similarity) scores are analyzed by multilevel statistical models with covariates such as time interval between two fingerprints in comparison, subject's age, and fingerprint image quality. Longitudinal fingerprint records of 15,597 subjects are sampled from an operational fingerprint database such that each individual has at least five 10-print records over a minimum time span of 5 y. In regard to the persistence of fingerprints, the longitudinal analysis on a single (right index) finger demonstrates that (i) genuine match scores tend to significantly decrease when time interval between two fingerprints in comparison increases, whereas the change in impostor match scores is negligible; and (ii) fingerprint recognition accuracy at operational settings, nevertheless, tends to be stable as the time interval increases up to 12 y, the maximum time span in the dataset. However, the uncertainty of temporal stability of fingerprint recognition accuracy becomes substantially large if either of the two fingerprints being compared is of poor quality. The conclusions drawn from 10-finger fusion analysis coincide with the conclusions from single-finger analysis.

  16. Device for biometric verification of maternity

    Directory of Open Access Journals (Sweden)

    Lalović Komlen

    2015-01-01

    Full Text Available Biometry is the scientific discipline and technology that measures and analyzes physiological or behavioral characteristics of people and is widely deployed in modern society security systems. Device for biometric identification of maternity is a dual fingerprint scanner that acquires fingerprint templates of the mother and the child at the very moment of birth, generates unique ID reference, and further guarantees mother-child relationship with that reference. Technical issue that is solved with this work and the proposed device is scanning, processing, and storing encrypted biometric templates with a goal to provide a 100% guarantee maternity for each new born child. Scanning the fingerprints of both mother and the child simultaneously, at moment of birth, and pairing them with unique ID reference removes potential fears occurring from hospital negligence to malicious activities, while the data encryption raises the whole process to the highest level of security and confidentiality. The main contribution of the device that removes the fear that almost every mother has in this period as it provides an answer to the question: “Is this my baby?” with a 100% guarantee “It’s certainly yours!”

  17. Nanotag luminescent fingerprint anti-counterfeiting technology

    DEFF Research Database (Denmark)

    Radziwon, Michal Jędrzej; Rubahn, Horst-Günter; Johansen, Stefan

    2012-01-01

    We describe a method to fabricate, transfer and validate via image processing nanofibre- based, unique security marks (“nanotags”) for anti-counterfeiting purposes. Epitaxial surface growth of oligophenylenes on a heated muscovite mica crystal results in a thin film of mutually aligned nanofibres....... This fingerprint can be transferred on an adhesive tape as a label of a product, imaged using low magnification microscopy, digitalised and stored in a database. Infrared surface heating, enforced cooling and load lock transfer makes the fabrication process fast and scalable to mass production....

  18. Contrast enhancement of fingerprint images using intuitionistic type II fuzzy set

    Directory of Open Access Journals (Sweden)

    Devarasan Ezhilmaran

    2015-04-01

    Full Text Available A novel contrast image enhancement of fingerprint images using intuitionistic type II fuzzy set theory is recommended in this work. The method of Hamacher T co-norm(S norm which generates a new membership function with the help of upper and lower membership function of type II fuzzy set. The finger print identification is one of the very few techniques employed in forensic science to aid criminal investigations in daily life, providing access control in financial security;-, visa related services, as well as others. Mostly fingerprint images are poorly illuminated and hardly visible, so it is necessary to enhance the input images. The enhancement is useful for authentication and matching. The fingerprint enhancement is vital for identifying and authenticating people by matching their fingerprints with the stored one in the database. The proposed enhancement of the intuitionistic type II fuzzy set theory results showed that it is more effective, especially, very useful for forensic science operations. The experimental results were compared with non-fuzzy, fuzzy, intuitionistic fuzzy and type II fuzzy methods in which the proposed method offered better results with good quality, less noise and low blur features.

  19. Practical Pocket PC Application w/Biometric Security

    Science.gov (United States)

    Logan, Julian

    2004-01-01

    I work in the Flight Software Engineering Branch, where we provide design and development of embedded real-time software applications for flight and supporting ground systems to support the NASA Aeronautics and Space Programs. In addition, this branch evaluates, develops and implements new technologies for embedded real-time systems, and maintains a laboratory for applications of embedded technology. The majority of microchips that are used in modern society have been programmed using embedded technology. These small chips can be found in microwaves, calculators, home security systems, cell phones and more. My assignment this summer entails working with an iPAQ HP 5500 Pocket PC. This top-of-the-line hand-held device is one of the first mobile PC's to introduce biometric security capabilities. Biometric security, in this case a fingerprint authentication system, is on the edge of technology as far as securing information. The benefits of fingerprint authentication are enormous. The most significant of them are that it is extremely difficult to reproduce someone else's fingerprint, and it is equally difficult to lose or forget your own fingerprint as opposed to a password or pin number. One of my goals for this summer is to integrate this technology with another Pocket PC application. The second task for the summer is to develop a simple application that provides an Astronaut EVA (Extravehicular Activity) Log Book capability. The Astronaut EVA Log Book is what an astronaut would use to report the status of field missions, crew physical health, successes, future plans, etc. My goal is to develop a user interface into which these data fields can be entered and stored. The applications that I am developing are created using eMbedded Visual C++ 4.0 with the Pocket PC 2003 Software Development Kit provided by Microsoft.

  20. Stability of multilead ST-segment "fingerprints" over time after percutaneous transluminal coronary angioplasty and its usefulness in detecting reocclusion.

    Science.gov (United States)

    Krucoff, M W; Parente, A R; Bottner, R K; Renzi, R H; Stark, K S; Shugoll, R A; Ahmed, S W; DeMichele, J; Stroming, S L; Green, C E

    1988-06-01

    Multilead ST-segment recordings taken during percutaneous transluminal coronary angioplasty (PTCA) could function as an individualized noninvasive template or "fingerprint," useful in evaluating transient ischemic episodes after leaving the catheterization laboratory. To evaluate the reproducibility of such ST-segment patterns over time, these changes were analyzed in patients grouped according to the time between occlusion and reocclusion. For the patients in group 1, the study required comparing their "fingerprints" in repeat balloon inflation during PTCA (reocclusion in less than 1 hour), for those in group 2, comparing ST "fingerprints" during PTCA with ST changes during spontaneous early myocardial infarction (reocclusion in 24 hours) and in group 3, comparing ST "fingerprints" with ST changes during repeat PTCA for restenosis greater than 1 month after the initial PTCA. The ST "fingerprints" among the 20 patients in group 1 were identical in 14 cases (70%) and clearly related in another 4 (20%). Of the 23 patients in group 2, 12 (52%) had the same and 8 (35%) had related patterns. Of 19 patients in group 3, 8 (42% had the same pattern and 8 (42%) had related patterns. Thus, ST fingerprints were the same or clearly related with reocclusion in the same patient from less than 1 hour to greater than 1 month after initial occlusion in 87% of patients overall, in 90% in less than 1 hour, in 87% in less than 24 hours and in 84% greater than 1 month later. Multilead pattern ST-segment "fingerprints" may serve as a noninvasive marker for detecting site-specific reocclusion.

  1. Utility Validation of a New Fingerprint Quality Metric

    OpenAIRE

    Yao , Zhigang; Charrier , Christophe; Rosenberger , Christophe

    2014-01-01

    International audience; Fingerprint somehow can be regarded as a relatively fullfledged application in biometrics. The use of this biometric modality is not limited to traditional public security area, but spread into the daily life, smart phone authentication control and e-payment, for instance. However, quality control of biometric sample is still a necessary task due in order to optimize the operational performance. Research works had shown that biometric systems performance could be great...

  2. Photogrammetric fingerprint unwrapping

    Science.gov (United States)

    Paar, Gerhard; del Pilar Caballo Perucha, Maria; Bauer, Arnold; Nauschnegg, Bernhard

    2008-04-01

    Fingerprints are important biometric cues. Compared to conventional fingerprint sensors the use of contact-free stereoscopic image acquisition of the front-most finger segment has a set of advantages: Finger deformation is avoided, the entire relevant area for biometric use is covered, some technical aspects like sensor maintenance and cleaning are facilitated, and access to a three-dimensional reconstruction of the covered area is possible. We describe a photogrammetric workflow for nail-to-nail fingerprint reconstruction: A calibrated sensor setup with typically 5 cameras and dedicated illumination acquires adjacent stereo pairs. Using the silhouettes of the segmented finger a raw cylindrical model is generated. After preprocessing (shading correction, dust removal, lens distortion correction), each individual camera texture is projected onto the model. Image-to-image matching on these pseudo ortho images and dense 3D reconstruction obtains a textured cylindrical digital surface model with radial distances around the major axis and a grid size in the range of 25-50 µm. The model allows for objective fingerprint unwrapping and novel fingerprint matching algorithms since 3D relations between fingerprint features are available as additional cues. Moreover, covering the entire region with relevant fingerprint texture is particularly important for establishing a comprehensive forensic database. The workflow has been implemented in portable C and is ready for industrial exploitation. Further improvement issues are code optimization, unwrapping method, illumination strategy to avoid highlights and to improve the initial segmentation, and the comparison of the unwrapping result to conventional fingerprint acquisition technology.

  3. Physics and fingerprints

    Science.gov (United States)

    Voss-de Haan, Patrick

    2006-08-01

    This article discusses a variety of aspects in the detection and development of fingerprints and the physics involved in it. It gives an introduction to some basic issues like composition and properties of fingerprint deposits and a rudimentary framework of dactyloscopy; it covers various techniques for the visualization of latent fingerprints; and it concludes with a view of current research topics. The techniques range from very common procedures, such as powdering and cyanoacrylate fuming, to more demanding methods, for example luminescence and vacuum metal deposition, to fairly unusual approaches like autoradiography. The emphasis is placed on the physical rather than the forensic aspects of these topics while trying to give the physicist—who is not dealing with fingerprinting and forensic science on a daily basis—a feeling for the problems and solutions in the visualization of latent fingerprints.

  4. The Digital Fingerprinting Analysis Concerning Google Calendar under Ubiquitous Mobile Computing Era

    Directory of Open Access Journals (Sweden)

    Hai-Cheng Chu

    2015-04-01

    Full Text Available Internet Communication Technologies (ICTs are making progress day by day, driven by the relentless need to utilize them for everything from leisure to business. This inevitable trend has dramatically changed contemporary digital behavior in all aspects. Undoubtedly, digital fingerprints will be at some point unwarily left on crime scenes creating digital information security incidents. On the other hand, corporates in the private sector or governments are on the edge of being exploited in terms of confidential digital information leakages. Some digital fingerprinting is volatile by its nature. Alternatively, once the power of computing devices is no longer sustainable, these digital traces could disappear forever. Due to the pervasive usage of Google Calendar and Safari browser among network communities, digital fingerprinting could be disclosed if forensics is carried out in a sound manner, which could be admitted in a court of law as probative evidences concerning certain cybercrime incidents.

  5. Fingerprints in cancer cells

    International Nuclear Information System (INIS)

    Servomaa, K.

    1994-01-01

    Gene research has shown that factors causing cancer, or carcinogens, may leave marks typical of each particular carcinogen (fingerprints) in the genotype of the cell. Radiation, for instance, may leave such fingerprints in a cancer cell. In particular, the discovery of a gene called p53 has yielded much new information on fingerprints. It has been discovered, for example, that toxic fungus and UV-radiation each leave fingerprints in the p53 gene. Based on the detection of fingerprints, it may be possible in the future to tell a cancer patient what factor had trigged the maglinancy

  6. RSA Key Development Using Fingerprint Image on Text Message

    Science.gov (United States)

    Rahman, Sayuti; Triana, Indah; Khairani, Sumi; Yasir, Amru; Sundari, Siti

    2017-12-01

    Along with the development of technology today, humans are very facilitated in accessing information and Communicate with various media, including through the Internet network . Messages are sent by media such as text are not necessarily guaranteed security. it is often found someone that wants to send a secret message to the recipient, but the messages can be known by irresponsible people. So the sender feels dissappointed because the secret message that should be known only to the recipient only becomes known by the irresponsible people . It is necessary to do security the message by using the RSA algorithm, Using fingerprint image to generate RSA key.This is a solution to enrich the security of a message,it is needed to process images firstly before generating RSA keys with feature extraction.

  7. Amplified-fragment length polymorphism fingerprinting of Mycoplasma species

    DEFF Research Database (Denmark)

    Kokotovic, Branko; Friis, N.F.; Jensen, J.S.

    1999-01-01

    Amplified-fragment length polymorphism (AFLP) is a whole-genome fingerprinting method based on selective amplification of restriction fragments. The potential of the method for the characterization of mycoplasmas was investigated in a total of 50 strains of human and animal origin, including...... Mycoplasma genitalium (n = 11), Mycoplasma pneumoniae (n = 5), Mycoplasma hominis (n = 5), Mycoplasma hyopneunmoniae (n = 9), Myco plasma flocculare (n = 5), Mycoplasma hyosynoviae (n = 10), and Mycoplasma dispar (n = 5), AFLP templates were prepared by the digestion of mycoplasmal DNA with BglII and Mfe...... to discriminate the analyzed strains at species and intraspecies levels as well, Each of the tested Mycoplasma species developed a banding pattern entirely different from those obtained from other species under analysis, Subtle intraspecies genomic differences were detected among strains of all of the Mycoplasma...

  8. Performance Assessment Method for a Forged Fingerprint Detection Algorithm

    Science.gov (United States)

    Shin, Yong Nyuo; Jun, In-Kyung; Kim, Hyun; Shin, Woochang

    The threat of invasion of privacy and of the illegal appropriation of information both increase with the expansion of the biometrics service environment to open systems. However, while certificates or smart cards can easily be cancelled and reissued if found to be missing, there is no way to recover the unique biometric information of an individual following a security breach. With the recognition that this threat factor may disrupt the large-scale civil service operations approaching implementation, such as electronic ID cards and e-Government systems, many agencies and vendors around the world continue to develop forged fingerprint detection technology, but no objective performance assessment method has, to date, been reported. Therefore, in this paper, we propose a methodology designed to evaluate the objective performance of the forged fingerprint detection technology that is currently attracting a great deal of attention.

  9. Biometric National Identification Number Generation for Secure ...

    African Journals Online (AJOL)

    Biometric National Identification Number Generation for Secure Network Authentication Based Fingerprint. ... Username, Password, Remember me, or Register ... In this paper an authentication based finger print biometric system is proposed ...

  10. A Multimodal Technique for an Embedded Fingerprint Recognizer in Mobile Payment Systems

    Directory of Open Access Journals (Sweden)

    V. Conti

    2009-01-01

    Full Text Available The development and the diffusion of distributed systems, directly connected to recent communication technologies, move people towards the era of mobile and ubiquitous systems. Distributed systems make merchant-customer relationships closer and more flexible, using reliable e-commerce technologies. These systems and environments need many distributed access points, for the creation and management of secure identities and for the secure recognition of users. Traditionally, these access points can be made possible by a software system with a main central server. This work proposes the study and implementation of a multimodal technique, based on biometric information, for identity management and personal ubiquitous authentication. The multimodal technique uses both fingerprint micro features (minutiae and fingerprint macro features (singularity points for robust user authentication. To strengthen the security level of electronic payment systems, an embedded hardware prototype has been also created: acting as self-contained sensors, it performs the entire authentication process on the same device, so that all critical information (e.g. biometric data, account transactions and cryptographic keys, are managed and stored inside the sensor, without any data transmission. The sensor has been prototyped using the Celoxica RC203E board, achieving fast execution time, low working frequency, and good recognition performance.

  11. 78 FR 55274 - Privacy Act of 1974; Department of Homeland Security/Transportation Security Administration-DHS...

    Science.gov (United States)

    2013-09-10

    ... enforcement, immigration, and intelligence databases, including a fingerprint-based criminal history records... boarding pass printing instruction. If the passenger's identifying information matches the entry on the TSA... enforcement, immigration, intelligence, or other homeland security functions. In addition, TSA may share...

  12. Feeling Is Believing: A Secure Template Exchange Protocol

    NARCIS (Netherlands)

    Buhan, I.R.; Doumen, J.M.; Hartel, Pieter H.; Veldhuis, Raymond N.J.; Lee, Seong-Whan; Li, Stan Z.

    We use grip pattern based biometrics as a secure side channel to achieve pre-authentication in a protocol that sets up a secure channel between two hand held devices. The protocol efficiently calculates a shared secret key from biometric data. The protocol is used in an application where grip

  13. Piezoelectric micromachined ultrasonic transducers for fingerprint sensing

    Science.gov (United States)

    Lu, Yipeng

    Fingerprint identification is the most prevalent biometric technology due to its uniqueness, universality and convenience. Over the past two decades, a variety of physical mechanisms have been exploited to capture an electronic image of a human fingerprint. Among these, capacitive fingerprint sensors are the ones most widely used in consumer electronics because they are fabricated using conventional complementary metal oxide semiconductor (CMOS) integrated circuit technology. However, capacitive fingerprint sensors are extremely sensitive to finger contamination and moisture. This thesis will introduce an ultrasonic fingerprint sensor using a PMUT array, which offers a potential solution to this problem. In addition, it has the potential to increase security, as it allows images to be collected at various depths beneath the epidermis, providing images of the sub-surface dermis layer and blood vessels. Firstly, PMUT sensitivity is maximized by optimizing the layer stack and electrode design, and the coupling coefficient is doubled via series transduction. Moreover, a broadband PMUT with 97% fractional bandwidth is achieved by utilizing a thinner structure excited at two adjacent mechanical vibration modes with overlapping bandwidth. In addition, we proposed waveguide PMUTs, which function to direct acoustic waves, confine acoustic energy, and provide mechanical protection for the PMUT array. Furthermore, PMUT arrays were fabricated with different processes to form the membrane, including front-side etching with a patterned sacrificial layer, front-side etching with additional anchor, cavity SOI wafers and eutectic bonding. Additionally, eutectic bonding allows the PMUT to be integrated with CMOS circuits. PMUTs were characterized in the mechanical, electrical and acoustic domains. Using transmit beamforming, a narrow acoustic beam was achieved, and high-resolution (sub-100 microm) and short-range (~1 mm) pulse-echo ultrasonic imaging was demonstrated using a steel

  14. Security planning an applied approach

    CERN Document Server

    Lincke, Susan

    2015-01-01

    This book guides readers through building an IT security plan. Offering a template, it helps readers to prioritize risks, conform to regulation, plan their defense and secure proprietary/confidential information. The process is documented in the supplemental online security workbook. Security Planning is designed for the busy IT practitioner, who does not have time to become a security expert, but needs a security plan now. It also serves to educate the reader of a broader set of concepts related to the security environment through the Introductory Concepts and Advanced sections. The book serv

  15. Security aspects in teleradiology workflow

    Science.gov (United States)

    Soegner, Peter I.; Helweg, Gernot; Holzer, Heimo; zur Nedden, Dieter

    2000-05-01

    The medicolegal necessity of privacy, security and confidentiality was the aim of the attempt to develop a secure teleradiology workflow between the telepartners -- radiologist and the referring physician. To avoid the lack of dataprotection and datasecurity we introduced biometric fingerprint scanners in combination with smart cards to identify the teleradiology partners and communicated over an encrypted TCP/IP satellite link between Innsbruck and Reutte. We used an asymmetric kryptography method to guarantee authentification, integrity of the data-packages and confidentiality of the medical data. It was necessary to use a biometric feature to avoid a case of mistaken identity of persons, who wanted access to the system. Only an invariable electronical identification allowed a legal liability to the final report and only a secure dataconnection allowed the exchange of sensible medical data between different partners of Health Care Networks. In our study we selected the user friendly combination of a smart card and a biometric fingerprint technique, called SkymedTM Double Guard Secure Keyboard (Agfa-Gevaert) to confirm identities and log into the imaging workstations and the electronic patient record. We examined the interoperability of the used software with the existing platforms. Only the WIN-XX operating systems could be protected at the time of our study.

  16. [The genetic fingerprints file in France: between security and freedom].

    Science.gov (United States)

    Manaouil, C; Gignon, M; Werbrouck, A; Jarde, O

    2008-01-01

    In France, the French National File Automated with Genetic fingerprints (FNAEG) is a bank automated by genetic data which is used in penal domain. It facilitates search of the authors of malpractices, or the missing people. Since 1998, it has enabled to resolve numerous criminal cases. An extension of the field of application has been observed. It is a confidential register which is subjected to numerous controls. Nevertheless, private character of the data and its functioning (criminal character of the refusal of taking, periods of answer, and problem of data's conservation) explain the important contesting of associations worried about the respect of personal freedoms.

  17. Quantifying privacy and security of biometric fuzzy commitment

    NARCIS (Netherlands)

    Zhou, Xuebing; Kuijper, Arjan; Veldhuis, Raymond N.J.; Busch, Christoph

    2011-01-01

    Fuzzy commitment is an efficient template protection algorithm that can improve security and safeguard privacy of biometrics. Existing theoretical security analysis has proved that although privacy leakage is unavoidable, perfect security from information-theoretical points of view is possible when

  18. Visa Security Policy: Roles of the Departments of State and Homeland Security

    Science.gov (United States)

    2011-06-30

    Cong., 2nd sess., April 20, 1950. 13 8 U.S.C. 1104 . 14 8 U.S.C. 1201. AILA InfoNet Doc. No. 11071267. (Posted 07/12/11) Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS automated

  19. Dealing with Insufficient Location Fingerprints in Wi-Fi Based Indoor Location Fingerprinting

    Directory of Open Access Journals (Sweden)

    Kai Dong

    2017-01-01

    Full Text Available The development of the Internet of Things has accelerated research in the indoor location fingerprinting technique, which provides value-added localization services for existing WLAN infrastructures without the need for any specialized hardware. The deployment of a fingerprinting based localization system requires an extremely large amount of measurements on received signal strength information to generate a location fingerprint database. Nonetheless, this requirement can rarely be satisfied in most indoor environments. In this paper, we target one but common situation when the collected measurements on received signal strength information are insufficient, and show limitations of existing location fingerprinting methods in dealing with inadequate location fingerprints. We also introduce a novel method to reduce noise in measuring the received signal strength based on the maximum likelihood estimation, and compute locations from inadequate location fingerprints by using the stochastic gradient descent algorithm. Our experiment results show that our proposed method can achieve better localization performance even when only a small quantity of RSS measurements is available. Especially when the number of observations at each location is small, our proposed method has evident superiority in localization accuracy.

  20. Fingerprint Change: Not Visible, But Tangible.

    Science.gov (United States)

    Negri, Francesca V; De Giorgi, Annamaria; Bozzetti, Cecilia; Squadrilli, Anna; Petronini, Pier Giorgio; Leonardi, Francesco; Bisogno, Luigi; Garofano, Luciano

    2017-09-01

    Hand-foot syndrome, a chemotherapy-induced cutaneous toxicity, can cause an alteration in fingerprints causing a setback for cancer patients due to the occurrence of false rejections. A colon cancer patient was fingerprinted after not having been able to use fingerprint recognition devices after 6 months of adjuvant chemotherapy. The fingerprint images were digitally processed to improve fingerprint definition without altering the papillary design. No evidence of skin toxicity was present. Two months later, the situation returned to normal. The fingerprint evaluation conducted on 15 identification points highlighted the quantitative and qualitative fingerprint alteration details detected after the end of chemotherapy and 2 months later. Fingerprint alteration during chemotherapy has been reported, but to our knowledge, this particular case is the first ever reported without evident clinical signs. Alternative fingerprint identification methods as well as improved biometric identification systems are needed in case of unexpected situations. © 2017 American Academy of Forensic Sciences.

  1. On the Horizon: New Advances in Security Technology

    Science.gov (United States)

    Gamble, Cheryl

    2005-01-01

    The worlds of security and technology have been on an intersecting course since the first published account of the use of fingerprint identification made news in 1880 (although unpublished reports suggest its use as early as 1858). In the three and one half years since the September 11 attacks, technological advances across the security field have…

  2. A Novel Surgical Template Design in Staged Dental Implant Rehabilitations

    Directory of Open Access Journals (Sweden)

    Michael Patras

    2012-05-01

    Full Text Available Background: The philosophy of a gradual transition to an implant retained prosthesis in cases of full-mouth or extensive rehabilitation usually involves a staged treatment concept. In this therapeutic approach, the placement of implants may sometimes be divided into phases. During a subsequent surgical phase of treatment, the pre-existing implants can serve as anchors for the surgical template. Those modified surgical templates help in the precise transferring of restorative information into the surgical field and guide the optimal three-dimensional implant positioning. Methods: This article highlights the rationale of implant-retained surgical templates and illustrates them through the presentation of two clinical cases. The templates are duplicates of the provisional restorations and are secured to the existing implants through the utilization of implant mounts. Results: This template design in such staged procedures provided stability in the surgical field and enhanced the accuracy in implant positioning based upon the planned restoration, thus ensuring predictable treatment outcomes.Conclusions: Successful rehabilitation lies in the correct sequence of surgical and prosthetic procedures. Whenever a staged approach of implant placement is planned, the clinician can effectively use the initially placed implants as anchors for the surgical template during the second phase of implant surgery.

  3. Securing Iris Templates using Combined User and Soft Biometric based Password Hardened Fuzzy Vault

    OpenAIRE

    Meenakshi, V. S.; Padmavathi, G.

    2010-01-01

    Personal identification and authentication is very crucial in the current scenario. Biometrics plays an important role in this area. Biometric based authentication has proved superior compared to traditional password based authentication. Anyhow biometrics is permanent feature of a person and cannot be reissued when compromised as passwords. To over come this problem, instead of storing the original biometric templates transformed templates can be stored. Whenever the transformation function ...

  4. Fingerprint separation: an application of ICA

    Science.gov (United States)

    Singh, Meenakshi; Singh, Deepak Kumar; Kalra, Prem Kumar

    2008-04-01

    Among all existing biometric techniques, fingerprint-based identification is the oldest method, which has been successfully used in numerous applications. Fingerprint-based identification is the most recognized tool in biometrics because of its reliability and accuracy. Fingerprint identification is done by matching questioned and known friction skin ridge impressions from fingers, palms, and toes to determine if the impressions are from the same finger (or palm, toe, etc.). There are many fingerprint matching algorithms which automate and facilitate the job of fingerprint matching, but for any of these algorithms matching can be difficult if the fingerprints are overlapped or mixed. In this paper, we have proposed a new algorithm for separating overlapped or mixed fingerprints so that the performance of the matching algorithms will improve when they are fed with these inputs. Independent Component Analysis (ICA) has been used as a tool to separate the overlapped or mixed fingerprints.

  5. Architecture and Assessment: Privacy Preserving Biometrically Secured Electronic Documents

    Science.gov (United States)

    2015-01-01

    very large public and private fingerprint databases comprehensive risk analysis and system security contribution to developing international ...Safety and Security Program which is led by Defence Research and Development Canada’s Centre for Security Science, in partnership with Public Safety...201 © Sa Majesté la Reine (en droit du Canada), telle que représentée par le ministre de la Défense nationale, 201 Science and Engineering

  6. Fingerprints in Compressed Strings

    DEFF Research Database (Denmark)

    Bille, Philip; Cording, Patrick Hagge; Gørtz, Inge Li

    2013-01-01

    The Karp-Rabin fingerprint of a string is a type of hash value that due to its strong properties has been used in many string algorithms. In this paper we show how to construct a data structure for a string S of size N compressed by a context-free grammar of size n that answers fingerprint queries...... derivative that captures LZ78 compression and its variations) we get O(loglogN) query time. Hence, our data structures has the same time and space complexity as for random access in SLPs. We utilize the fingerprint data structures to solve the longest common extension problem in query time O(logNlogℓ) and O....... That is, given indices i and j, the answer to a query is the fingerprint of the substring S[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(logN) query time, and for Linear SLPs (an SLP...

  7. Study on internal to surface fingerprint correlation using optical coherence tomography and internal fingerprint extraction

    CSIR Research Space (South Africa)

    Darlow, LN

    2015-11-01

    Full Text Available of, the above-mentioned works. Internal fingerprint zone detection is an improvement as it uses fuzzy c-means to improve clustering performance, uses better cluster result postprocessing, and improves upon the fine-tuning procedure through... Internal fingerprint extraction consists of two main parts: fingerprint zone detection and extraction. Zone detection uses fuzzy c-means clustering to approximate the location of the papillary junction (i.e., the internal fingerprint zone). Edge detection...

  8. Modeling Audio Fingerprints : Structure, Distortion, Capacity

    NARCIS (Netherlands)

    Doets, P.J.O.

    2010-01-01

    An audio fingerprint is a compact low-level representation of a multimedia signal. An audio fingerprint can be used to identify audio files or fragments in a reliable way. The use of audio fingerprints for identification consists of two phases. In the enrollment phase known content is fingerprinted,

  9. FINGERPRINT VERIFICATION IN PERSONAL IDENTIFICATION BY APPLYING LOCAL WALSH HADAMARD TRANSFORM AND GABOR COEFFICIENTS

    Directory of Open Access Journals (Sweden)

    K N Pushpalatha

    2017-05-01

    Full Text Available In an era of advanced computer technology world where innumerable services such as access to bank accounts, or access to secured data or entry to some national important organizations require authentication of genuine individual. Among all biometric personal identification systems, fingerprint recognition system is most accurate and economical technology. In this paper we have proposed fingerprint recognition system using Local Walsh Hadamard Transform (LWHT with Phase Magnitude Histograms (PMHs for feature extraction. Fingerprints display oriented texture-like patterns. Gabor filters have the property of capturing global and local texture information from blur or unclear images and filter bank provides the orientation features which are robust to image distortion and rotation. The LWHT algorithm is compared with other two approaches viz., Gabor Coefficients and Directional Features. The three methods are compared using FVC 2006 Finger print database images. It is found from the observation that the values of TSR, FAR and FRR have improved results compared to existing algorithm.

  10. Fingerprint fake detection by optical coherence tomography

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  11. Perl Template Toolkit

    CERN Document Server

    Chamberlain, Darren; Cross, David; Torkington, Nathan; Diaz, tatiana Apandi

    2004-01-01

    Among the many different approaches to "templating" with Perl--such as Embperl, Mason, HTML::Template, and hundreds of other lesser known systems--the Template Toolkit is widely recognized as one of the most versatile. Like other templating systems, the Template Toolkit allows programmers to embed Perl code and custom macros into HTML documents in order to create customized documents on the fly. But unlike the others, the Template Toolkit is as facile at producing HTML as it is at producing XML, PDF, or any other output format. And because it has its own simple templating language, templates

  12. Classical and quantum fingerprinting strategies

    International Nuclear Information System (INIS)

    Scott, A.; Walgate, J.; Sanders, B.

    2005-01-01

    Full text: Fingerprinting enables two parties to infer whether the messages they hold are the same or different when the cost of communication is high: each message is associated with a smaller fingerprint and comparisons between messages are made in terms of their fingerprints alone. When the two parties are forbidden access to a public coin, it is known that fingerprints composed of quantum information can be made exponentially smaller than those composed of classical information. We present specific constructions of classical fingerprinting strategies through the use of constant-weight codes and provide bounds on the worst-case error probability with the help of extremal set theory. These classical strategies are easily outperformed by quantum strategies constructed from line packings and equiangular tight frames. (author)

  13. The spectroscopic detection of drugs of abuse in fingerprints after development with powders and recovery with adhesive lifters

    Science.gov (United States)

    West, Matthew J.; Went, Michael J.

    2009-01-01

    The application of powders to fingerprints has long been established as an effective and reliable method for developing latent fingerprints. Fingerprints developed in situ at a crime scene routinely undergo lifting with specialist tapes and are then stored in evidence bags to allow secure transit and also to preserve the chain of evidence. In a previous study we have shown that exogenous material within a fingerprint can be detected using Raman spectroscopy following development with powders and lifting with adhesive tapes. Other reports have detailed the use of Raman spectroscopy to the detection of drugs of abuse in latent fingerprints including cyanoacrylate-fumed fingerprints. This study involves the application of Raman spectroscopy for the analysis of drugs of abuse in latent fingerprints for fingerprints that had been treated with powders and also subsequently lifted with adhesive tapes. Samples of seized ecstasy, cocaine, ketamine and amphetamine were supplied by East Sussex Police and by the TICTAC unit at St. Georges Hospital Tooting. Contaminated fingerprints were deposited on clean glass slides. The application of aluminium or iron based powders to contaminated fingerprints did not interfere with the Raman spectra obtained for the contaminants. Contaminated fingerprints developed with powders and then lifted with lifting tapes were also examined. The combination of these two techniques did not interfere with the successful analysis. The lifting process was repeated using hinge lifters. As the hinge lifters exhibited strong Raman bands the spectroscopic analysis was more complex and an increase in the number of exposures to the detector allowed for improved clarification. Spectral subtraction was performed to remove peaks due to the hinge lifters using OMNIC software. Raman spectra of developed and lifted fingerprints recorded through evidence bags were obtained and it was found that the detection process was not compromised. Although the application of

  14. Security seal

    Science.gov (United States)

    Gobeli, Garth W.

    1985-01-01

    Security for a package or verifying seal in plastic material is provided by a print seal with unique thermally produced imprints in the plastic. If tampering is attempted, the material is irreparably damaged and thus detectable. The pattern of the imprints, similar to "fingerprints" are recorded as a positive identification for the seal, and corresponding recordings made to allow comparison. The integrity of the seal is proved by the comparison of imprint identification records made by laser beam projection.

  15. Advances in fingerprint analysis.

    Science.gov (United States)

    Hazarika, Pompi; Russell, David A

    2012-04-10

    Fingerprints have been used in forensic investigations for the identification of individuals since the late 19th century. However, it is now clear that fingerprints can provide significantly more information about an individual. Here, we highlight the considerable advances in fingerprinting technology that can simultaneously provide chemical information regarding the drugs ingested and the explosives and drugs handled by a person as well as the identity of that individual. Copyright © 2012 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  16. Influence of Skin Diseases on Fingerprint Recognition

    Science.gov (United States)

    Drahansky, Martin; Dolezel, Michal; Urbanek, Jaroslav; Brezinova, Eva; Kim, Tai-hoon

    2012-01-01

    There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described. PMID:22654483

  17. Influence of Skin Diseases on Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Martin Drahansky

    2012-01-01

    Full Text Available There are many people who suffer from some of the skin diseases. These diseases have a strong influence on the process of fingerprint recognition. People with fingerprint diseases are unable to use fingerprint scanners, which is discriminating for them, since they are not allowed to use their fingerprints for the authentication purposes. First in this paper the various diseases, which might influence functionality of the fingerprint-based systems, are introduced, mainly from the medical point of view. This overview is followed by some examples of diseased finger fingerprints, acquired both from dactyloscopic card and electronic sensors. At the end of this paper the proposed fingerprint image enhancement algorithm is described.

  18. Design of Cancelable Palmprint Templates Based on Look Up Table

    Science.gov (United States)

    Qiu, Jian; Li, Hengjian; Dong, Jiwen

    2018-03-01

    A novel cancelable palmprint templates generation scheme is proposed in this paper. Firstly, the Gabor filter and chaotic matrix are used to extract palmprint features. It is then arranged into a row vector and divided into equal size blocks. These blocks are converted to corresponding decimals and mapped to look up tables, forming final cancelable palmprint features based on the selected check bits. Finally, collaborative representation based classification with regularized least square is used for classification. Experimental results on the Hong Kong PolyU Palmprint Database verify that the proposed cancelable templates can achieve very high performance and security levels. Meanwhile, it can also satisfy the needs of real-time applications.

  19. Fingerprint start the next generation of payment method : Fingerprint payment: a new mode of mobile payment

    OpenAIRE

    Wu, Chong

    2016-01-01

    In the generation of mobile internet, fingerprint payment is one of the most popular topics at the moment. China has a big market and many users are using the mobile payment methods. There are a large number of mobile phones equipped with fingerprint recognition technology. As we know, fingerprint payment brings us more convenience and safety. We do not need to use many bankcards, and fingerprint also eliminates the users from the trouble of queuing to pay. However, users send traditional dig...

  20. Biometric Quantization through Detection Rate Optimized Bit Allocation

    Directory of Open Access Journals (Sweden)

    C. Chen

    2009-01-01

    Full Text Available Extracting binary strings from real-valued biometric templates is a fundamental step in many biometric template protection systems, such as fuzzy commitment, fuzzy extractor, secure sketch, and helper data systems. Previous work has been focusing on the design of optimal quantization and coding for each single feature component, yet the binary string—concatenation of all coded feature components—is not optimal. In this paper, we present a detection rate optimized bit allocation (DROBA principle, which assigns more bits to discriminative features and fewer bits to nondiscriminative features. We further propose a dynamic programming (DP approach and a greedy search (GS approach to achieve DROBA. Experiments of DROBA on the FVC2000 fingerprint database and the FRGC face database show good performances. As a universal method, DROBA is applicable to arbitrary biometric modalities, such as fingerprint texture, iris, signature, and face. DROBA will bring significant benefits not only to the template protection systems but also to the systems with fast matching requirements or constrained storage capability.

  1. Data Compression of Fingerprint Minutiae

    OpenAIRE

    VISHAL SHRIVASTAVA; SUMIT SHARMA

    2012-01-01

    Biometric techniques have usual advantages over conventional personal identification technique. Among various commercially available biometric techniques such as face, fingerprint, Iris etc., fingerprint-based techniques are the most accepted recognition system. Fingerprints are trace or impression of patterns created byfriction ridges of the skin in the fingers and thumbs. Steganography usually used in smart card is a safe technique for authenticating a person. In steganography, biometric ch...

  2. Fingerprint Recognition Using Minutia Score Matching

    OpenAIRE

    J, Ravi.; Raja, K. B.; R, Venugopal. K.

    2010-01-01

    The popular Biometric used to authenticate a person is Fingerprint which is unique and permanent throughout a person’s life. A minutia matching is widely used for fingerprint recognition and can be classified as ridge ending and ridge bifurcation. In this paper we projected Fingerprint Recognition using Minutia Score Matching method (FRMSM). For Fingerprint thinning, the Block Filter is used, which scans the image at the boundary to preserves the quality of the image and extract the minutiae ...

  3. Review analysis of properties for an ideal secure biometric template scheme

    CSIR Research Space (South Africa)

    Mzila, Phiwa

    2016-02-01

    Full Text Available privacy and system security. To mitigate this problem, various biometric protection techniques have been proposed. Most of these schemes aim to satisfy diversity, revocability, security and performance properties, as requirements for ideal secured...

  4. Fingerprint verification prediction model in hand dermatitis.

    Science.gov (United States)

    Lee, Chew K; Chang, Choong C; Johor, Asmah; Othman, Puwira; Baba, Roshidah

    2015-07-01

    Hand dermatitis associated fingerprint changes is a significant problem and affects fingerprint verification processes. This study was done to develop a clinically useful prediction model for fingerprint verification in patients with hand dermatitis. A case-control study involving 100 patients with hand dermatitis. All patients verified their thumbprints against their identity card. Registered fingerprints were randomized into a model derivation and model validation group. Predictive model was derived using multiple logistic regression. Validation was done using the goodness-of-fit test. The fingerprint verification prediction model consists of a major criterion (fingerprint dystrophy area of ≥ 25%) and two minor criteria (long horizontal lines and long vertical lines). The presence of the major criterion predicts it will almost always fail verification, while presence of both minor criteria and presence of one minor criterion predict high and low risk of fingerprint verification failure, respectively. When none of the criteria are met, the fingerprint almost always passes the verification. The area under the receiver operating characteristic curve was 0.937, and the goodness-of-fit test showed agreement between the observed and expected number (P = 0.26). The derived fingerprint verification failure prediction model is validated and highly discriminatory in predicting risk of fingerprint verification in patients with hand dermatitis. © 2014 The International Society of Dermatology.

  5. An effective one-dimensional anisotropic fingerprint enhancement algorithm

    Science.gov (United States)

    Ye, Zhendong; Xie, Mei

    2012-01-01

    Fingerprint identification is one of the most important biometric technologies. The performance of the minutiae extraction and the speed of the fingerprint verification system rely heavily on the quality of the input fingerprint images, so the enhancement of the low fingerprint is a critical and difficult step in a fingerprint verification system. In this paper we proposed an effective algorithm for fingerprint enhancement. Firstly we use normalization algorithm to reduce the variations in gray level values along ridges and valleys. Then we utilize the structure tensor approach to estimate each pixel of the fingerprint orientations. At last we propose a novel algorithm which combines the advantages of onedimensional Gabor filtering method and anisotropic method to enhance the fingerprint in recoverable region. The proposed algorithm has been evaluated on the database of Fingerprint Verification Competition 2004, and the results show that our algorithm performs within less time.

  6. An Introduction to DNA Fingerprinting.

    Science.gov (United States)

    Hepfer, Carol Ely; And Others

    1993-01-01

    Provides background information on DNA fingerprinting, and describes exercises for introducing general biology students at the high school or college level to the methodology and applications of DNA fingerprinting. (PR)

  7. Predicting the performance of fingerprint similarity searching.

    Science.gov (United States)

    Vogt, Martin; Bajorath, Jürgen

    2011-01-01

    Fingerprints are bit string representations of molecular structure that typically encode structural fragments, topological features, or pharmacophore patterns. Various fingerprint designs are utilized in virtual screening and their search performance essentially depends on three parameters: the nature of the fingerprint, the active compounds serving as reference molecules, and the composition of the screening database. It is of considerable interest and practical relevance to predict the performance of fingerprint similarity searching. A quantitative assessment of the potential that a fingerprint search might successfully retrieve active compounds, if available in the screening database, would substantially help to select the type of fingerprint most suitable for a given search problem. The method presented herein utilizes concepts from information theory to relate the fingerprint feature distributions of reference compounds to screening libraries. If these feature distributions do not sufficiently differ, active database compounds that are similar to reference molecules cannot be retrieved because they disappear in the "background." By quantifying the difference in feature distribution using the Kullback-Leibler divergence and relating the divergence to compound recovery rates obtained for different benchmark classes, fingerprint search performance can be quantitatively predicted.

  8. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Saxifraga stolonifera Meerb.

    Directory of Open Access Journals (Sweden)

    Xing-Dong Wu

    2015-12-01

    Full Text Available This work investigated the spectrum-effect relationships between high performance liquid chromatography (HPLC fingerprints and the anti-benign prostatic hyperplasia activities of aqueous extracts from Saxifraga stolonifera. The fingerprints of S. stolonifera from various sources were established by HPLC and evaluated by similarity analysis (SA, hierarchical clustering analysis (HCA and principal component analysis (PCA. Nine samples were obtained from these 24 batches of different origins, according to the results of SA, HCA and the common chromatographic peaks area. A testosterone-induced mouse model of benign prostatic hyperplasia (BPH was used to establish the anti-benign prostatic hyperplasia activities of these nine S. stolonifera samples. The model was evaluated by analyzing prostatic index (PI, serum acid phosphatase (ACP activity, concentrations of serum dihydrotestosterone (DHT, prostatic acid phosphatase (PACP and type II 5α-reductase (SRD5A2. The spectrum-effect relationships between HPLC fingerprints and anti-benign prostatic hyperplasia activities were investigated using Grey Correlation Analysis (GRA and partial least squares regression (PLSR. The results showed that a close correlation existed between the fingerprints and anti-benign prostatic hyperplasia activities, and peak 14 (chlorogenic acid, peak 17 (quercetin 5-O-β-d-glucopyranoside and peak 18 (quercetin 3-O-β-l-rhamno-pyranoside in the HPLC fingerprints might be the main active components against anti-benign prostatic hyperplasia. This work provides a general model for the study of spectrum-effect relationships of S. stolonifera by combing HPLC fingerprints with a testosterone-induced mouse model of BPH, which can be employed to discover the principle components of anti-benign prostatic hyperplasia bioactivity.

  9. Fingerprint Quality Evaluation in a Novel Embedded Authentication System for Mobile Users

    Directory of Open Access Journals (Sweden)

    Giuseppe Vitello

    2015-01-01

    Full Text Available The way people access resources, data and services, is radically changing using modern mobile technologies. In this scenario, biometry is a good solution for security issues even if its performance is influenced by the acquired data quality. In this paper, a novel embedded automatic fingerprint authentication system (AFAS for mobile users is described. The goal of the proposed system is to improve the performance of a standard embedded AFAS in order to enable its employment in mobile devices architectures. The system is focused on the quality evaluation of the raw acquired fingerprint, identifying areas of poor quality. Using this approach, no image enhancement process is needed after the fingerprint acquisition phase. The Agility RC2000 board has been used to prototype the embedded device. Due its different image resolution and quality, the experimental tests have been conducted on both PolyU and FVC2002 DB2-B free databases. Experimental results show an interesting trade-off between used resources, authentication time, and accuracy rate. The best achieved false acceptance rate (FAR and false rejection rate (FRR indexes are 0% and 6.25%, respectively. The elaboration time is 62.6 ms with a working frequency of 50 MHz.

  10. Code Generation with Templates

    CERN Document Server

    Arnoldus, Jeroen; Serebrenik, A

    2012-01-01

    Templates are used to generate all kinds of text, including computer code. The last decade, the use of templates gained a lot of popularity due to the increase of dynamic web applications. Templates are a tool for programmers, and implementations of template engines are most times based on practical experience rather than based on a theoretical background. This book reveals the mathematical background of templates and shows interesting findings for improving the practical use of templates. First, a framework to determine the necessary computational power for the template metalanguage is presen

  11. Three-dimensional fingerprint recognition by using convolution neural network

    Science.gov (United States)

    Tian, Qianyu; Gao, Nan; Zhang, Zonghua

    2018-01-01

    With the development of science and technology and the improvement of social information, fingerprint recognition technology has become a hot research direction and been widely applied in many actual fields because of its feasibility and reliability. The traditional two-dimensional (2D) fingerprint recognition method relies on matching feature points. This method is not only time-consuming, but also lost three-dimensional (3D) information of fingerprint, with the fingerprint rotation, scaling, damage and other issues, a serious decline in robustness. To solve these problems, 3D fingerprint has been used to recognize human being. Because it is a new research field, there are still lots of challenging problems in 3D fingerprint recognition. This paper presents a new 3D fingerprint recognition method by using a convolution neural network (CNN). By combining 2D fingerprint and fingerprint depth map into CNN, and then through another CNN feature fusion, the characteristics of the fusion complete 3D fingerprint recognition after classification. This method not only can preserve 3D information of fingerprints, but also solves the problem of CNN input. Moreover, the recognition process is simpler than traditional feature point matching algorithm. 3D fingerprint recognition rate by using CNN is compared with other fingerprint recognition algorithms. The experimental results show that the proposed 3D fingerprint recognition method has good recognition rate and robustness.

  12. Latent fingerprints on different type of screen protective films

    Directory of Open Access Journals (Sweden)

    Yuttana Sudjaroen

    2016-07-01

    Full Text Available The purpose of this research was to study the quality of latent fingerprint on different types of screen protective films including screen protector, matte screen protector, anti-fingerprint clear screen protector and anti-fingerprint matte screen protector by using black powder method in developing latent fingerprints. The fingerprints were performed by 10 volunteers whose fingers (right index, right thumb, left index and left thumb were stubbing at different types of screen protective films and subsequently latent fingerprints were developed by brushing with black powder. Automated Fingerprint Identification System (AFIS counted the numbers of minutiae points from 320 latent fingerprints. Anti-fingerprint matte screen protective film produced the best quality of latent fingerprint with an average minutiae point 72.65, followed by matte screen protective film, clear screen protective film and anti-fingerprint clear screen protective film with an average minutiae point of 155.2, 135.0 and 72.65 respectively. The quality of latent fingerprints developed between a clear and a matte surface of screen protective films showed a significant difference (sig>0.05, whereas the coat and the non-coat with anti-fingerprint chemical revealed a non-significant difference (sig<0.05 in their number of minutiae points.

  13. Enhancing Critical Infrastructure and Key Resources (CIKR) Level-0 Physical Process Security Using Field Device Distinct Native Attribute Features

    Energy Technology Data Exchange (ETDEWEB)

    Lopez, Juan [Oak Ridge National Lab. (ORNL), Oak Ridge, TN (United States); Liefer, Nathan C. [Wright-Patterson AFB, Dayton, OH (United States); Busho, Colin R. [Wright-Patterson AFB, Dayton, OH (United States); Temple, Michael A. [Wright-Patterson AFB, Dayton, OH (United States)

    2017-12-04

    Here, the need for improved Critical Infrastructure and Key Resource (CIKR) security is unquestioned and there has been minimal emphasis on Level-0 (PHY Process) improvements. Wired Signal Distinct Native Attribute (WS-DNA) Fingerprinting is investigated here as a non-intrusive PHY-based security augmentation to support an envisioned layered security strategy. Results are based on experimental response collections from Highway Addressable Remote Transducer (HART) Differential Pressure Transmitter (DPT) devices from three manufacturers (Yokogawa, Honeywell, Endress+Hauer) installed in an automated process control system. Device discrimination is assessed using Time Domain (TD) and Slope-Based FSK (SB-FSK) fingerprints input to Multiple Discriminant Analysis, Maximum Likelihood (MDA/ML) and Random Forest (RndF) classifiers. For 12 different classes (two devices per manufacturer at two distinct set points), both classifiers performed reliably and achieved an arbitrary performance benchmark of average cross-class percent correct of %C > 90%. The least challenging cross-manufacturer results included near-perfect %C ≈ 100%, while the more challenging like-model (serial number) discrimination results included 90%< %C < 100%, with TD Fingerprinting marginally outperforming SB-FSK Fingerprinting; SB-FSK benefits from having less stringent response alignment and registration requirements. The RndF classifier was most beneficial and enabled reliable selection of dimensionally reduced fingerprint subsets that minimize data storage and computational requirements. The RndF selected feature sets contained 15% of the full-dimensional feature sets and only suffered a worst case %CΔ = 3% to 4% performance degradation.

  14. Fingerprints in compressed strings

    DEFF Research Database (Denmark)

    Bille, Philip; Gørtz, Inge Li; Cording, Patrick Hagge

    2017-01-01

    In this paper we show how to construct a data structure for a string S of size N compressed into a context-free grammar of size n that supports efficient Karp–Rabin fingerprint queries to any substring of S. That is, given indices i and j, the answer to a query is the fingerprint of the substring S......[i,j]. We present the first O(n) space data structures that answer fingerprint queries without decompressing any characters. For Straight Line Programs (SLP) we get O(log⁡N) query time, and for Linear SLPs (an SLP derivative that captures LZ78 compression and its variations) we get O(log⁡log⁡N) query time...

  15. Case study of 3D fingerprints applications.

    Directory of Open Access Journals (Sweden)

    Feng Liu

    Full Text Available Human fingers are 3D objects. More information will be provided if three dimensional (3D fingerprints are available compared with two dimensional (2D fingerprints. Thus, this paper firstly collected 3D finger point cloud data by Structured-light Illumination method. Additional features from 3D fingerprint images are then studied and extracted. The applications of these features are finally discussed. A series of experiments are conducted to demonstrate the helpfulness of 3D information to fingerprint recognition. Results show that a quick alignment can be easily implemented under the guidance of 3D finger shape feature even though this feature does not work for fingerprint recognition directly. The newly defined distinctive 3D shape ridge feature can be used for personal authentication with Equal Error Rate (EER of ~8.3%. Also, it is helpful to remove false core point. Furthermore, a promising of EER ~1.3% is realized by combining this feature with 2D features for fingerprint recognition which indicates the prospect of 3D fingerprint recognition.

  16. Fingerprint Analysis with Marked Point Processes

    DEFF Research Database (Denmark)

    Forbes, Peter G. M.; Lauritzen, Steffen; Møller, Jesper

    We present a framework for fingerprint matching based on marked point process models. An efficient Monte Carlo algorithm is developed to calculate the marginal likelihood ratio for the hypothesis that two observed prints originate from the same finger against the hypothesis that they originate from...... different fingers. Our model achieves good performance on an NIST-FBI fingerprint database of 258 matched fingerprint pairs....

  17. Collusion-resistant multimedia fingerprinting: a unified framework

    Science.gov (United States)

    Wu, Min; Trappe, Wade; Wang, Z. Jane; Liu, K. J. Ray

    2004-06-01

    Digital fingerprints are unique labels inserted in different copies of the same content before distribution. Each digital fingerprint is assigned to an inteded recipient, and can be used to trace the culprits who use their content for unintended purposes. Attacks mounted by multiple users, known as collusion attacks, provide a cost-effective method for attenuating the identifying fingerprint from each coluder, thus collusion poses a reeal challenge to protect the digital media data and enforce usage policies. This paper examines a few major design methodologies for collusion-resistant fingerprinting of multimedia, and presents a unified framework that helps highlight the common issues and the uniqueness of different fingerprinting techniques.

  18. Dna fingerprinting - review paper

    OpenAIRE

    Blundell, Renald

    2006-01-01

    Before the Polymerase Chain Reaction (PCR) was established, DNA fingerprinting technology has relied for years on Restriction Fragment Length Polymorphism (RFLP) and Variable Number of Tandom Repeats (VNTR) analysis, a very efficient technique but quite laborious and not suitable for high throughput mapping. Since its, development, PCR has provided a new and powerful tool for DNA fingerprinting.

  19. Electronic fingerprinting of the dead.

    Science.gov (United States)

    Rutty, G N; Stringer, K; Turk, E E

    2008-01-01

    To date, a number of methods exist for the capture of fingerprints from cadavers that can then be used in isolation as a primary method for the identification of the dead. We report the use of a handheld, mobile wireless unit used in conjunction with a personal digital assistant (PDA) device for the capture of fingerprints from the dead. We also consider a handheld single-digit fingerprint scanner that utilises a USB laptop connection for the electronic capture of cadaveric fingerprints. Both are single-operator units that, if ridge detail is preserved, can collect a 10-set of finger pad prints in approximately 45 and 90 s, respectively. We present our observations on the restrictions as to when such devices can be used with cadavers. We do, however, illustrate that the images are of sufficient quality to allow positive identification from finger pad prints of the dead. With the development of mobile, handheld, biometric, PDA-based units for the police, we hypothesize that, under certain circumstances, devices such as these could be used for the accelerated acquisition of fingerprint identification data with the potential for rapid near-patient identification in the future.

  20. Feature Level Two -Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits

    Directory of Open Access Journals (Sweden)

    Jerusalin Carol .J

    Full Text Available ABSTRACT The fingerprint, knuckle print and the retina are used to authenticate a person accurately because of the permanence in the features. These three biometric traits are fused for better security. The fingerprint and knuckle print images are pre-processed by morphological techniques and the features are extracted from the normalized image using gabor filter. The retinal image is converted to gray image and pre-processing is done using top hat and bottom hat filtering. Blood vessels are segmented and the features are extracted by locating the optic disk as the centre point. The extracted features from the fingerprint, knuckle print and the retina are fused together as one template and stored in the data base for authentication purpose, thus reducing the space and time complexity.

  1. INFORMATION SECURITY AND SECURE SEARCH OVER ENCRYPTED DATA IN CLOUD STORAGE SERVICES

    OpenAIRE

    Mr. A Mustagees Shaikh *; Prof. Nitin B. Raut

    2016-01-01

    Cloud computing is most widely used as the next generation architecture of IT enterprises, that provide convenient remote access to data storage and application services. This cloud storage can potentially bring great economical savings for data owners and users, but due to wide concerns of data owners that their private data may be exposed or handled by cloud providers. Hence end-to-end encryption techniques and fuzzy fingerprint technique have been used as solutions for secure cloud data st...

  2. A Computational Discriminability Analysis on Twin Fingerprints

    Science.gov (United States)

    Liu, Yu; Srihari, Sargur N.

    Sharing similar genetic traits makes the investigation of twins an important study in forensics and biometrics. Fingerprints are one of the most commonly found types of forensic evidence. The similarity between twins’ prints is critical establish to the reliability of fingerprint identification. We present a quantitative analysis of the discriminability of twin fingerprints on a new data set (227 pairs of identical twins and fraternal twins) recently collected from a twin population using both level 1 and level 2 features. Although the patterns of minutiae among twins are more similar than in the general population, the similarity of fingerprints of twins is significantly different from that between genuine prints of the same finger. Twins fingerprints are discriminable with a 1.5%~1.7% higher EER than non-twins. And identical twins can be distinguished by examine fingerprint with a slightly higher error rate than fraternal twins.

  3. Fingerprinting with Wow

    Science.gov (United States)

    Yu, Eugene; Craver, Scott

    2006-02-01

    Wow, or time warping caused by speed fluctuations in analog audio equipment, provides a wealth of applications in watermarking. Very subtle temporal distortion has been used to defeat watermarks, and as components in watermarking systems. In the image domain, the analogous warping of an image's canvas has been used both to defeat watermarks and also proposed to prevent collusion attacks on fingerprinting systems. In this paper, we explore how subliminal levels of wow can be used for steganography and fingerprinting. We present both a low-bitrate robust solution and a higher-bitrate solution intended for steganographic communication. As already observed, such a fingerprinting algorithm naturally discourages collusion by averaging, owing to flanging effects when misaligned audio is averaged. Another advantage of warping is that even when imperceptible, it can be beyond the reach of compression algorithms. We use this opportunity to debunk the common misconception that steganography is impossible under "perfect compression."

  4. Multimodal Biometric System- Fusion Of Face And Fingerprint Biometrics At Match Score Fusion Level

    Directory of Open Access Journals (Sweden)

    Grace Wangari Mwaura

    2017-04-01

    Full Text Available Biometrics has developed to be one of the most relevant technologies used in Information Technology IT security. Unimodal biometric systems have a variety of problems which decreases the performance and accuracy of these system. One way to overcome the limitations of the unimodal biometric systems is through fusion to form a multimodal biometric system. Generally biometric fusion is defined as the use of multiple types of biometric data or ways of processing the data to improve the performance of biometric systems. This paper proposes to develop a model for fusion of the face and fingerprint biometric at the match score fusion level. The face and fingerprint unimodal in the proposed model are built using scale invariant feature transform SIFT algorithm and the hamming distance to measure the distance between key points. To evaluate the performance of the multimodal system the FAR and FRR of the multimodal are compared along those of the individual unimodal systems. It has been established that the multimodal has a higher accuracy of 92.5 compared to the face unimodal system at 90 while the fingerprint unimodal system is at 82.5.

  5. Endpoint Security Using Biometric Authentication for Secure Remote Mission Operations

    Science.gov (United States)

    Donohue, John T.; Critchfield, Anna R.

    2000-01-01

    We propose a flexible security authentication solution for the spacecraft end-user, which will allow the user to interact over Internet with the spacecraft, its instruments, or with the ground segment from anywhere, anytime based on the user's pre-defined set of privileges. This package includes biometrics authentication products, such as face, voice or fingerprint recognition, authentication services and procedures, such as: user registration and verification over the Internet and user database maintenance, with a configurable schema of spacecraft users' privileges. This fast and reliable user authentication mechanism will become an integral part of end-to-end ground-to-space secure Internet communications and migration from current practice to the future. All modules and services of the proposed package are commercially available and built to the NIST BioAPI standard, which facilitates "pluggability" and interoperability.

  6. Tools for quality control of fingerprint databases

    Science.gov (United States)

    Swann, B. Scott; Libert, John M.; Lepley, Margaret A.

    2010-04-01

    Integrity of fingerprint data is essential to biometric and forensic applications. Accordingly, the FBI's Criminal Justice Information Services (CJIS) Division has sponsored development of software tools to facilitate quality control functions relative to maintaining its fingerprint data assets inherent to the Integrated Automated Fingerprint Identification System (IAFIS) and Next Generation Identification (NGI). This paper provides an introduction of two such tools. The first FBI-sponsored tool was developed by the National Institute of Standards and Technology (NIST) and examines and detects the spectral signature of the ridge-flow structure characteristic of friction ridge skin. The Spectral Image Validation/Verification (SIVV) utility differentiates fingerprints from non-fingerprints, including blank frames or segmentation failures erroneously included in data; provides a "first look" at image quality; and can identify anomalies in sample rates of scanned images. The SIVV utility might detect errors in individual 10-print fingerprints inaccurately segmented from the flat, multi-finger image acquired by one of the automated collection systems increasing in availability and usage. In such cases, the lost fingerprint can be recovered by re-segmentation from the now compressed multi-finger image record. The second FBI-sponsored tool, CropCoeff was developed by MITRE and thoroughly tested via NIST. CropCoeff enables cropping of the replacement single print directly from the compressed data file, thus avoiding decompression and recompression of images that might degrade fingerprint features necessary for matching.

  7. Enhance Criminal Investigation by Proposed Fingerprint Recognition System

    International Nuclear Information System (INIS)

    Hashem, S.H.; Maolod, A.T.; Mohammad, A.A.

    2014-01-01

    Law enforcement officers and forensic specialists spend hours thinking about how fingerprints solve crimes, and trying to find, collect, record and compare these unique identifiers that can connect a specific person to a specific crime. These individuals understand that a basic human feature that most people take for granted, can be one of the most effective tools in crime solving.This research exploits our previous work to be applicable in criminal investigation field. The present study aims to solve the advance crime by strength fingerprint’s criminal investigation to control the alterations happen intentionally to criminals’ fingerprint. That done by suggest strategy introduce an optimal fingerprint image feature’s vector to the person and then considers it to be stored in database for future matching. Selecting optimal fingerprint feature’s vector strategy deal with considering 10 fingerprints for each criminal person (take the fingerprint in different time and different circumstance of criminal such as finger is dirty, wet, trembling, etc.). Proposal begun with apply a proposed enrollment on all 10 fingerprint for each criminal, the enrollment include the following consequence steps; begin with preprocessing step for each of 10 images including enhancement, then two level of feature extraction (first level to extract arches, whorls, and loops, where second level extract minutiae), after that applying proposed Genetic Algorithm to select optimal fingerprint, master fingerprint, which in our point of view present the most universal image which include more detailed features to recognition. Master fingerprint will be feature’s vector which stored in database. Then apply the proposed matching by testing fingerprints with these stored in database.While, measuring of criminal fingerprint investigation performance by calculating False Reject Rate (FRR)and False Accept Rate (FAR) for the traditional system and the proposed in criminal detection field. The

  8. THRIVE: threshold homomorphic encryption based secure and privacy preserving biometric verification system

    Science.gov (United States)

    Karabat, Cagatay; Kiraz, Mehmet Sabir; Erdogan, Hakan; Savas, Erkay

    2015-12-01

    In this paper, we introduce a new biometric verification and template protection system which we call THRIVE. The system includes novel enrollment and authentication protocols based on threshold homomorphic encryption where a private key is shared between a user and a verifier. In the THRIVE system, only encrypted binary biometric templates are stored in a database and verification is performed via homomorphically randomized templates, thus, original templates are never revealed during authentication. Due to the underlying threshold homomorphic encryption scheme, a malicious database owner cannot perform full decryption on encrypted templates of the users in the database. In addition, security of the THRIVE system is enhanced using a two-factor authentication scheme involving user's private key and biometric data. Using simulation-based techniques, the proposed system is proven secure in the malicious model. The proposed system is suitable for applications where the user does not want to reveal her biometrics to the verifier in plain form, but needs to prove her identity by using biometrics. The system can be used with any biometric modality where a feature extraction method yields a fixed size binary template and a query template is verified when its Hamming distance to the database template is less than a threshold. The overall connection time for the proposed THRIVE system is estimated to be 336 ms on average for 256-bit biometric templates on a desktop PC running with quad core 3.2 GHz CPUs at 10 Mbit/s up/down link connection speed. Consequently, the proposed system can be efficiently used in real-life applications.

  9. 75 FR 9919 - Extension of Agency Information Collection Activity Under OMB Review: Air Cargo Security...

    Science.gov (United States)

    2010-03-04

    ... operating under a security program, and all-cargo carriers. These five categories are: security programs, security threat assessments (STA), known shipper data via the Known Shipper Management System (KSMS), cargo... Verification Form, Aircraft Operator or Air Carrier Reporting Template, Security Threat Assessment Application...

  10. Report: Fiscal Year 2011 Federal Information Security Management Act Report Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #12-P-0062, November 9, 2011. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2011 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  11. Templating mesoporous zeolites

    DEFF Research Database (Denmark)

    Egeblad, Kresten; Christensen, Christina Hviid; Kustova, Marina

    2008-01-01

    The application of templating methods to produce zeolite materials with hierarchical bi- or trimodal pore size distributions is reviewed with emphasis on mesoporous materials. Hierarchical zeolite materials are categorized into three distinctly different types of materials: hierarchical zeolite...... crystals, nanosized zeolite crystals, and supported zeolite crystals. For the pure zeolite materials in the first two categories, the additional meso- or macroporosity can be classified as being either intracrystalline or intercrystalline, whereas for supported zeolite materials, the additional porosity...... originates almost exclusively from the support material. The methods for introducing mesopores into zeolite materials are discussed and categorized. In general, mesopores can be templated in zeolite materials by use of solid templating, supramolecular templating, or indirect templating...

  12. ORIENTATION FIELD RECONSTRUCTION OF ALTERED FINGERPRINT USING ORTHOGONAL WAVELETS

    Directory of Open Access Journals (Sweden)

    Mini M.G.

    2016-11-01

    Full Text Available Ridge orientation field is an important feature for fingerprint matching and fingerprint reconstruction. Matching of the altered fingerprint against its unaltered mates can be done by extracting the available features in the altered fingerprint and using it along with approximated ridge orientation. This paper presents a method for approximating ridge orientation field of altered fingerprints. In the proposed method, sine and cosine of doubled orientation of the fingerprint is decomposed using orthogonal wavelets and reconstructed back using only the approximation coefficients. No prior information about the singular points is needed for orientation approximation. The method is found suitable for orientation estimation of low quality fingerprint images also.

  13. 8 CFR 1236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 1236.5... ORDERED REMOVED Detention of Aliens Prior to Order of Removal § 1236.5 Fingerprints and photographs. Every... photographed. Such fingerprints and photographs shall be made available to Federal, State, and local law...

  14. Near-Optimal Fingerprinting with Constraints

    Directory of Open Access Journals (Sweden)

    Gulyás Gábor György

    2016-10-01

    Full Text Available Several recent studies have demonstrated that people show large behavioural uniqueness. This has serious privacy implications as most individuals become increasingly re-identifiable in large datasets or can be tracked, while they are browsing the web, using only a couple of their attributes, called as their fingerprints. Often, the success of these attacks depends on explicit constraints on the number of attributes learnable about individuals, i.e., the size of their fingerprints. These constraints can be budget as well as technical constraints imposed by the data holder. For instance, Apple restricts the number of applications that can be called by another application on iOS in order to mitigate the potential privacy threats of leaking the list of installed applications on a device. In this work, we address the problem of identifying the attributes (e.g., smartphone applications that can serve as a fingerprint of users given constraints on the size of the fingerprint. We give the best fingerprinting algorithms in general, and evaluate their effectiveness on several real-world datasets. Our results show that current privacy guards limiting the number of attributes that can be queried about individuals is insufficient to mitigate their potential privacy risks in many practical cases.

  15. The relation between the secrecy rate of biometric template protection and biometric recognition performance

    NARCIS (Netherlands)

    Veldhuis, Raymond N.J.

    2015-01-01

    A theoretical result relating the maximum achievable security of the family of biometric template protection systems known as key-binding systems to the recognition performance of a biometric recognition system that is optimal in Neyman-Pearson sense is derived. The relation allows for the

  16. A Survey On Biometric Security Technologies From Cloud Computing Perspective

    Directory of Open Access Journals (Sweden)

    Shivashish Ratnam

    2015-08-01

    Full Text Available Cloud computing is one of the rising technologies that takes set of connections users to the next level. Cloud is a technology where resources are paid as per usage rather than owned. One of the major challenges in this technology is Security. Biometric systems provide the answer to ensure that the rendered services are accessed only by a legal user or an authorized user and no one else. Biometric systems recognize users based on behavioral or physiological characteristics. The advantages of such systems over traditional validation methods such as passwords and IDs are well known and hence biometric systems are progressively gaining ground in terms of usage. This paper brings about a new replica of a security system where in users have to offer multiple biometric finger prints during Enrollment for a service. These templates are stored at the cloud providers section. The users are authenticated based on these finger print designed templates which have to be provided in the order of arbitrary numbers or imaginary numbers that are generated every time continuously. Both finger prints templates and images are present and they provided every time duration are encrypted or modified for enhanced security.

  17. Microbial DNA fingerprinting of human fingerprints: dynamic colonization of fingertip microflora challenges human host inferences for forensic purposes.

    Science.gov (United States)

    Tims, Sebastian; van Wamel, Willem; Endtz, Hubert P; van Belkum, Alex; Kayser, Manfred

    2010-09-01

    Human fingertip microflora is transferred to touched objects and may provide forensically relevant information on individual hosts, such as on geographic origins, if endogenous microbial skin species/strains would be retrievable from physical fingerprints and would carry geographically restricted DNA diversity. We tested the suitability of physical fingerprints for revealing human host information, with geographic inference as example, via microbial DNA fingerprinting. We showed that the transient exogenous fingertip microflora is frequently different from the resident endogenous bacteria of the same individuals. In only 54% of the experiments, the DNA analysis of the transient fingertip microflora allowed the detection of defined, but often not the major, elements of the resident microflora. Although we found microbial persistency in certain individuals, time-wise variation of transient and resident microflora within individuals was also observed when resampling fingerprints after 3 weeks. While microbial species differed considerably in their frequency spectrum between fingerprint samples from volunteers in Europe and southern Asia, there was no clear geographic distinction between Staphylococcus strains in a cluster analysis, although bacterial genotypes did not overlap between both continental regions. Our results, though limited in quantity, clearly demonstrate that the dynamic fingerprint microflora challenges human host inferences for forensic purposes including geographic ones. Overall, our results suggest that human fingerprint microflora is too dynamic to allow for forensic marker developments for retrieving human information.

  18. Comparative Performance Analysis of Different Fingerprint Biometric Scanners for Patient Matching.

    Science.gov (United States)

    Kasiiti, Noah; Wawira, Judy; Purkayastha, Saptarshi; Were, Martin C

    2017-01-01

    Unique patient identification within health services is an operational challenge in healthcare settings. Use of key identifiers, such as patient names, hospital identification numbers, national ID, and birth date are often inadequate for ensuring unique patient identification. In addition approximate string comparator algorithms, such as distance-based algorithms, have proven suboptimal for improving patient matching, especially in low-resource settings. Biometric approaches may improve unique patient identification. However, before implementing the technology in a given setting, such as health care, the right scanners should be rigorously tested to identify an optimal package for the implementation. This study aimed to investigate the effects of factors such as resolution, template size, and scan capture area on the matching performance of different fingerprint scanners for use within health care settings. Performance analysis of eight different scanners was tested using the demo application distributed as part of the Neurotech Verifinger SDK 6.0.

  19. Attendance fingerprint identification system using arduino and single board computer

    Science.gov (United States)

    Muchtar, M. A.; Seniman; Arisandi, D.; Hasanah, S.

    2018-03-01

    Fingerprint is one of the most unique parts of the human body that distinguishes one person from others and is easily accessed. This uniqueness is supported by technology that can automatically identify or recognize a person called fingerprint sensor. Yet, the existing Fingerprint Sensor can only do fingerprint identification on one machine. For the mentioned reason, we need a method to be able to recognize each user in a different fingerprint sensor. The purpose of this research is to build fingerprint sensor system for fingerprint data management to be centralized so identification can be done in each Fingerprint Sensor. The result of this research shows that by using Arduino and Raspberry Pi, data processing can be centralized so that fingerprint identification can be done in each fingerprint sensor with 98.5 % success rate of centralized server recording.

  20. Security and privacy in biometrics

    CERN Document Server

    Campisi, Patrizio

    2013-01-01

    This important text/reference presents the latest secure and privacy-compliant techniques in automatic human recognition. Featuring viewpoints from an international selection of experts in the field, the comprehensive coverage spans both theory and practical implementations, taking into consideration all ethical and legal issues. Topics and features: presents a unique focus on novel approaches and new architectures for unimodal and multimodal template protection; examines signal processing techniques in the encrypted domain, security and privacy leakage assessment, and aspects of standardizati

  1. Entropy based fingerprint for local crystalline order

    Science.gov (United States)

    Piaggi, Pablo M.; Parrinello, Michele

    2017-09-01

    We introduce a new fingerprint that allows distinguishing between liquid-like and solid-like atomic environments. This fingerprint is based on an approximate expression for the entropy projected on individual atoms. When combined with local enthalpy, this fingerprint acquires an even finer resolution and it is capable of discriminating between different crystal structures.

  2. Forensic Chemistry: The Revelation of Latent Fingerprints

    Science.gov (United States)

    Friesen, J. Brent

    2015-01-01

    The visualization of latent fingerprints often involves the use of a chemical substance that creates a contrast between the fingerprint residues and the surface on which the print was deposited. The chemical-aided visualization techniques can be divided into two main categories: those that chemically react with the fingerprint residue and those…

  3. FINGERPRINT DETECTION AND RECOGNIZATION TECHNIQUES USING GABOR FILTER

    OpenAIRE

    Yogita Verma*, Prof. Bhagwati Charan Patel

    2017-01-01

    Fingerprints are most extensively and effectively appropriate for the proof of identity in present days. Mostly because of their uniqueness among the people, public acceptance, originality, stability through life, and their least risk of invasion. Fingerprint technology, which is basically a biometric system, is utilized to identify an individual based on their physical qualities. Fingerprint matching is the trendiest biometric method appropriate to provide authentication. Fingerprint verific...

  4. Interoperability between Fingerprint Biometric Systems: An Empirical Study

    OpenAIRE

    Gashi, I.; Mason, S.; Lugini, L.; Marasco, E.; Cukic, B.

    2014-01-01

    Fingerprints are likely the most widely used biometric in commercial as well as law enforcement applications. With the expected rapid growth of fingerprint authentication in mobile devices their importance justifies increased demands for dependability. An increasing number of new sensors,applications and a diverse user population also intensify concerns about the interoperability in fingerprint authentication. In most applications, fingerprints captured for user enrollment with one device may...

  5. A medium resolution fingerprint matching system

    Directory of Open Access Journals (Sweden)

    Ayman Mohammad Bahaa-Eldin

    2013-09-01

    Full Text Available In this paper, a novel minutiae based fingerprint matching system is proposed. The system is suitable for medium resolution fingerprint images obtained by low cost commercial sensors. The paper presents a new thinning algorithm, a new features extraction and representation, and a novel feature distance matching algorithm. The proposed system is rotation and translation invariant and is suitable for complete or partial fingerprint matching. The proposed algorithms are optimized to be executed on low resource environments both in CPU power and memory space. The system was evaluated using a standard fingerprint dataset and good performance and accuracy were achieved under certain image quality requirements. In addition, the proposed system was compared favorably to that of the state of the art systems.

  6. Information Theoretical Analysis of Identification based on Active Content Fingerprinting

    OpenAIRE

    Farhadzadeh, Farzad; Willems, Frans M. J.; Voloshinovskiy, Sviatoslav

    2014-01-01

    Content fingerprinting and digital watermarking are techniques that are used for content protection and distribution monitoring. Over the past few years, both techniques have been well studied and their shortcomings understood. Recently, a new content fingerprinting scheme called {\\em active content fingerprinting} was introduced to overcome these shortcomings. Active content fingerprinting aims to modify a content to extract robuster fingerprints than the conventional content fingerprinting....

  7. Report Template

    DEFF Research Database (Denmark)

    Bjørn, Anders; Laurent, Alexis; Owsianiak, Mikołaj

    2018-01-01

    To ensure consistent reporting of life cycle assessment (LCA), we provide a report template. The report includes elements of an LCA study as recommended but the ILCD Handbook. Illustrative case study reported according to this template is presented in Chap. 39 ....

  8. Sex Determination from Fingerprint Ridge Density | Gungadin ...

    African Journals Online (AJOL)

    This study was conducted with an aim to establish a relationship between sex and fingerprint ridge density. The fingerprints were taken from 500 subjects (250 males and 250 females) in the age group of 18-60 years. After taking fingerprints, the ridges were counted in the upper portion of the radial border of each print for all ...

  9. Dynamic Personal Identity and the Dynamic Identity Grid: How Theory and Concept Can Transform Information into Knowledge and Secure the American Homeland

    Science.gov (United States)

    2008-09-01

    80 Figure 12. Dynamic Identity Grid Strategy Canvas ..........................................................81 Figure 13. Hurdles to...GIG Global Information Grid HSPD Homeland Security Presidential Directive IAFIS Integrated Automated Fingerprint Identification System IP...recognizing a person based on a physiological or behavioral characteristic. Biometric features that can be measured include: facial, fingerprint , hand

  10. Parallel-Bit Stream for Securing Iris Recognition

    OpenAIRE

    Elsayed Mostafa; Maher Mansour; Heba Saad

    2012-01-01

    Biometrics-based authentication schemes have usability advantages over traditional password-based authentication schemes. However, biometrics raises several privacy concerns, it has disadvantages comparing to traditional password in which it is not secured and non revocable. In this paper, we propose a fast method for securing revocable iris template using parallel-bit stream watermarking to overcome these problems. Experimental results prove that the proposed method has low computation time ...

  11. Implementation of Minutiae Based Fingerprint Identification System Using Crossing Number Concept

    Directory of Open Access Journals (Sweden)

    Atul S. CHAUDHARI

    2014-01-01

    Full Text Available Biometric system is essentially a pattern recognition system which recognizes a person by determining the authenticity of a specific physiological (e.g., fingerprints, face, retina, iris or behavioral (e.g., gait, signature characteristic possessed by that person. Among all the presently employed biometric techniques, fingerprint identification systems have received the most attention due to the long history of fingerprints and its extensive use in forensics. Fingerprint is reliable biometric characteristic as it is unique and persistence. Fingerprint is the pattern of ridges and valleys on the surface of fingertip. However, recognizing fingerprints in poor quality images is still a very complex job, so the fingerprint image must be preprocessed before matching. It is very difficult to extract fingerprint features directly from gray scale fingerprint image. In this paper we have proposed the system which uses minutiae based matching algorithm for fingerprint identification. There are three main phases in proposed algorithm. First phase enhance the input fingerprint image by preprocessing it. The enhanced fingerprint image is converted into thinned binary image and then minutiae are extracted by using Crossing Number Concept in second phase. Third stage compares input fingerprint image (after preprocessing and minutiae extraction with fingerprint images enrolled in database and makes decision whether the input fingerprint is matched with the fingerprint stored in database or not.

  12. An Efficient Reconfigurable Architecture for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Satish S. Bhairannawar

    2016-01-01

    Full Text Available The fingerprint identification is an efficient biometric technique to authenticate human beings in real-time Big Data Analytics. In this paper, we propose an efficient Finite State Machine (FSM based reconfigurable architecture for fingerprint recognition. The fingerprint image is resized, and Compound Linear Binary Pattern (CLBP is applied on fingerprint, followed by histogram to obtain histogram CLBP features. Discrete Wavelet Transform (DWT Level 2 features are obtained by the same methodology. The novel matching score of CLBP is computed using histogram CLBP features of test image and fingerprint images in the database. Similarly, the DWT matching score is computed using DWT features of test image and fingerprint images in the database. Further, the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. The performance parameters such as TSR (Total Success Rate, FAR (False Acceptance Rate, and FRR (False Rejection Rate are computed using fusion scores with correlation matching technique for FVC2004 DB3 Database. The proposed fusion based VLSI architecture is synthesized on Virtex xc5vlx30T-3 FPGA board using Finite State Machine resulting in optimized parameters.

  13. Fingerprint and Face Identification for Large User Population

    Directory of Open Access Journals (Sweden)

    Teddy Ko

    2003-06-01

    Full Text Available The main objective of this paper is to present the state-of-the-art of the current biometric (fingerprint and face technology, lessons learned during the investigative analysis performed to ascertain the benefits of using combined fingerprint and facial technologies, and recommendations for the use of current available fingerprint and face identification technologies for optimum identification performance for applications using large user population. Prior fingerprint and face identification test study results have shown that their identification accuracies are strongly dependent on the image quality of the biometric inputs. Recommended methodologies for ensuring the capture of acceptable quality fingerprint and facial images of subjects are also presented in this paper.

  14. Programmable imprint lithography template

    Science.gov (United States)

    Cardinale, Gregory F [Oakland, CA; Talin, Albert A [Livermore, CA

    2006-10-31

    A template for imprint lithography (IL) that reduces significantly template production costs by allowing the same template to be re-used for several technology generations. The template is composed of an array of spaced-apart moveable and individually addressable rods or plungers. Thus, the template can be configured to provide a desired pattern by programming the array of plungers such that certain of the plungers are in an "up" or actuated configuration. This arrangement of "up" and "down" plungers forms a pattern composed of protruding and recessed features which can then be impressed onto a polymer film coated substrate by applying a pressure to the template impressing the programmed configuration into the polymer film. The pattern impressed into the polymer film will be reproduced on the substrate by subsequent processing.

  15. Modeling IrisCode and its variants as convex polyhedral cones and its security implications.

    Science.gov (United States)

    Kong, Adams Wai-Kin

    2013-03-01

    IrisCode, developed by Daugman, in 1993, is the most influential iris recognition algorithm. A thorough understanding of IrisCode is essential, because over 100 million persons have been enrolled by this algorithm and many biometric personal identification and template protection methods have been developed based on IrisCode. This paper indicates that a template produced by IrisCode or its variants is a convex polyhedral cone in a hyperspace. Its central ray, being a rough representation of the original biometric signal, can be computed by a simple algorithm, which can often be implemented in one Matlab command line. The central ray is an expected ray and also an optimal ray of an objective function on a group of distributions. This algorithm is derived from geometric properties of a convex polyhedral cone but does not rely on any prior knowledge (e.g., iris images). The experimental results show that biometric templates, including iris and palmprint templates, produced by different recognition methods can be matched through the central rays in their convex polyhedral cones and that templates protected by a method extended from IrisCode can be broken into. These experimental results indicate that, without a thorough security analysis, convex polyhedral cone templates cannot be assumed secure. Additionally, the simplicity of the algorithm implies that even junior hackers without knowledge of advanced image processing and biometric databases can still break into protected templates and reveal relationships among templates produced by different recognition methods.

  16. From scores to face templates: a model-based approach.

    Science.gov (United States)

    Mohanty, Pranab; Sarkar, Sudeep; Kasturi, Rangachar

    2007-12-01

    Regeneration of templates from match scores has security and privacy implications related to any biometric authentication system. We propose a novel paradigm to reconstruct face templates from match scores using a linear approach. It proceeds by first modeling the behavior of the given face recognition algorithm by an affine transformation. The goal of the modeling is to approximate the distances computed by a face recognition algorithm between two faces by distances between points, representing these faces, in an affine space. Given this space, templates from an independent image set (break-in) are matched only once with the enrolled template of the targeted subject and match scores are recorded. These scores are then used to embed the targeted subject in the approximating affine (non-orthogonal) space. Given the coordinates of the targeted subject in the affine space, the original template of the targeted subject is reconstructed using the inverse of the affine transformation. We demonstrate our ideas using three, fundamentally different, face recognition algorithms: Principal Component Analysis (PCA) with Mahalanobis cosine distance measure, Bayesian intra-extrapersonal classifier (BIC), and a feature-based commercial algorithm. To demonstrate the independence of the break-in set with the gallery set, we select face templates from two different databases: Face Recognition Grand Challenge (FRGC) and Facial Recognition Technology (FERET) Database (FERET). With an operational point set at 1 percent False Acceptance Rate (FAR) and 99 percent True Acceptance Rate (TAR) for 1,196 enrollments (FERET gallery), we show that at most 600 attempts (score computations) are required to achieve a 73 percent chance of breaking in as a randomly chosen target subject for the commercial face recognition system. With similar operational set up, we achieve a 72 percent and 100 percent chance of breaking in for the Bayesian and PCA based face recognition systems, respectively. With

  17. Implementation procedure for a fingerprint based matching and authentication system using filterbank for e-commerce applications

    International Nuclear Information System (INIS)

    Choudhry, B.S.; Baloch, A.K.; Pathan, A.H.

    2004-01-01

    The issue of secure online transactions is of almost importance in the present day world of Internet based commercial applications. Accurate authentication of a person before he or she is allowed to use a resource is very important. On the other hand biometrics is fast developing as a reliable and accurate system for person identification. Biometrics can be the answer to most of the security related problems of the online commercial world. Finger based matching and authentication systems are one of the most reliable systems that can be used for security applications. In this paper, we present a detailed description and implementation procedure for a fingerprint based matching and authentication system using Filterbank approach. The algorithm has been found to give good performance for low quality images. (author)

  18. OPTIMAL EXPERIMENT DESIGN FOR MAGNETIC RESONANCE FINGERPRINTING

    OpenAIRE

    Zhao, Bo; Haldar, Justin P.; Setsompop, Kawin; Wald, Lawrence L.

    2016-01-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cram��r-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experi...

  19. Image Processing and Features Extraction of Fingerprint Images ...

    African Journals Online (AJOL)

    To demonstrate the importance of the image processing of fingerprint images prior to image enrolment or comparison, the set of fingerprint images in databases (a) and (b) of the FVC (Fingerprint Verification Competition) 2000 database were analyzed using a features extraction algorithm. This paper presents the results of ...

  20. Intelligent techniques in signal processing for multimedia security

    CERN Document Server

    Santhi, V

    2017-01-01

    This book proposes new algorithms to ensure secured communications and prevent unauthorized data exchange in secured multimedia systems. Focusing on numerous applications’ algorithms and scenarios, it offers an in-depth analysis of data hiding technologies including watermarking, cryptography, encryption, copy control, and authentication. The authors present a framework for visual data hiding technologies that resolves emerging problems of modern multimedia applications in several contexts including the medical, healthcare, education, and wireless communication networking domains. Further, it introduces several intelligent security techniques with real-time implementation. As part of its comprehensive coverage, the book discusses contemporary multimedia authentication and fingerprinting techniques, while also proposing personal authentication/recognition systems based on hand images, surveillance system security using gait recognition, face recognition under restricted constraints such as dry/wet face condi...

  1. Development of an optimized random amplified polymorphic DNA protocol for fingerprinting of Klebsiella pneumoniae.

    Science.gov (United States)

    Ashayeri-Panah, M; Eftekhar, F; Feizabadi, M M

    2012-04-01

    To develop an optimized random amplified polymorphic DNA (RAPD) protocol for fingerprinting clinical isolates of Klebsiella pneumoniae. Employing factorial design of experiments, repeatable amplification patterns were obtained for 54 nosocomial isolates using 1 μmol 1(-1) primer, 4 mmol 1(-1) MgCl(2), 0·4 mmol 1(-1) dNTPs, 2·5 U Taq DNA polymerase and 90 ng DNA template in a total volume of 25 μl. The optimum thermocycling program was: initial denaturation at 94°C for 4 min followed by 50 cycles of 1 min at 94°C, 2 min at 34°C, 2 min at 72°C and a final extension at 72°C for 10 min. The optimized RAPD protocol was highly discriminatory (Simpson's diversity index, 0·982), and all isolates were typable with repeatable patterns (Pearson's similarity coefficient ≈ 100%). Seven main clusters were obtained on a similarity level of 70% and 32 distinct clusters on a similarity level of 85%, reflecting the heterogeneity of the isolates. Systematic optimization of RAPD generated reliable DNA fingerprints for nosocomial isolates of K. pneumoniae. This is the first report on RAPD optimization based on factorial design of experiments for discrimination of K. pneumoniae. © 2012 The Authors. Letters in Applied Microbiology © 2012 The Society for Applied Microbiology.

  2. Fingerprint enhancement using a multispectral sensor

    Science.gov (United States)

    Rowe, Robert K.; Nixon, Kristin A.

    2005-03-01

    The level of performance of a biometric fingerprint sensor is critically dependent on the quality of the fingerprint images. One of the most common types of optical fingerprint sensors relies on the phenomenon of total internal reflectance (TIR) to generate an image. Under ideal conditions, a TIR fingerprint sensor can produce high-contrast fingerprint images with excellent feature definition. However, images produced by the same sensor under conditions that include dry skin, dirt on the skin, and marginal contact between the finger and the sensor, are likely to be severely degraded. This paper discusses the use of multispectral sensing as a means to collect additional images with new information about the fingerprint that can significantly augment the system performance under both normal and adverse sample conditions. In the context of this paper, "multispectral sensing" is used to broadly denote a collection of images taken under different illumination conditions: different polarizations, different illumination/detection configurations, as well as different wavelength illumination. Results from three small studies using an early-stage prototype of the multispectral-TIR (MTIR) sensor are presented along with results from the corresponding TIR data. The first experiment produced data from 9 people, 4 fingers from each person and 3 measurements per finger under "normal" conditions. The second experiment provided results from a study performed to test the relative performance of TIR and MTIR images when taken under extreme dry and dirty conditions. The third experiment examined the case where the area of contact between the finger and sensor is greatly reduced.

  3. Recovery of latent fingerprints and DNA on human skin.

    Science.gov (United States)

    Färber, Doris; Seul, Andrea; Weisser, Hans-Joachim; Bohnert, Michael

    2010-11-01

    The project "Latent Fingerprints and DNA on Human Skin" was the first systematic research in Europe dealing with detection of fingerprints and DNA left by offenders on the skin of corpses. One thousand samples gave results that allow general statements on the materials and methods used. The tests were carried out according to a uniform trial structure. Fingerprints were deposited by natural donors on corpses. The latent fingerprints were treated with magnetic powder or black fingerprint powder. Afterward, they were lifted with silicone casting material (Isomark(®)) or gelatine foil. All lifts were swabbed to recover DNA. It was possible to visualize comparable and identifiable fingerprints on the skin of corpses (16%). In the same categories, magnetic powder (18.4%) yielded better results than black fingerprint powder (13.6%). The number of comparable and identifiable fingerprints decreased on the lifts (12.7%). Isomark(®) (14.9%) was the better lifting material in comparison with gelatine foil (10.1%). In one-third of the samples, DNA could be extracted from the powdered and lifted latents. Black fingerprint powder delivered the better result with a rate of 2.2% for full DNA profiles and profiles useful for exclusion in comparison with 1.8% for the magnetic powder traces. Isomark(®) (3.1%) yielded better results than gelatine foil (0.6%). © 2010 American Academy of Forensic Sciences.

  4. An approach to improve the match-on-card fingerprint authentication system security

    CSIR Research Space (South Africa)

    Nair, Kishor Krishnan

    2016-07-01

    Full Text Available -on-Card (TOC), Match-on- Card (MOC), Work-Sharing On-Card (WSOC), and System-on-Card (SOC). Out of these four approaches, the SOC is considered as the most secure and expensive, whereas the TOC is considered as the least secure and least expensive. The MOC...

  5. Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

    Directory of Open Access Journals (Sweden)

    Cătălin Lupu

    2015-03-01

    Full Text Available Online banking applications are used by more and more people all over the world. Most of the banks are providing these services to their customers. The authentication methods varies from the basic user and password to username and a onetime password (OTP generated by a virtual or a physical digipass. The common thing among authentication methods is that the login wepage is provided through a secure channel. Some banks have introduced (especially for testing purposes the authentication using common biometric characteristics, like fingerprint, voice or keystroke recognition. This paper will present some of the most common online banking authentication methods, together with basic biometric characteristics that could be used in these applications. The security in internet banking applications can be improved by using biometrics for the authentication process. Also, the authors have developed an application for authentication of users using fingerprint as the main characteristic, which will be presented at the end of this paper.

  6. Towards reconstruction of overlapping fingerprints using plasma spectroscopy

    Science.gov (United States)

    Yang, Jun-Ho; Choi, Soo-Jin; Yoh, Jack J.

    2017-08-01

    Chemical analysis is commonly used in the field of forensic science where the precise discrimination of primary evidence is of significant importance. Laser-Induced Breakdown Spectroscopy (LIBS) exceeds other spectroscopic methods in terms of the time required for pre- and post-sample preparation, the insensitivity to sample phase state be it solid, liquid, or gas, and the detection of two-dimensional spectral mapping from real time point measurements. In this research, fingerprint samples on various surface materials are considered in the chemical detection and reconstruction of fingerprints using the two-dimensional LIBS technique. Strong and distinct intensities of specific wavelengths represent visible ink, natural secretion of sweat, and contaminants from the environment, all of which can be present in latent fingerprints. The particular aim of the work presented here is to enhance the precision of the two-dimensional recreation of the fingerprints present on metal, plastic, and artificially prepared soil surface using LIBS with principal component analysis. By applying a distinct wavelength discrimination for two overlapping fingerprint samples, separation into two non-identical chemical fingerprints was successfully performed.

  7. Minutiae Matching with Privacy Protection Based on the Combination of Garbled Circuit and Homomorphic Encryption

    Directory of Open Access Journals (Sweden)

    Mengxing Li

    2014-01-01

    Full Text Available Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  8. Minutiae matching with privacy protection based on the combination of garbled circuit and homomorphic encryption.

    Science.gov (United States)

    Li, Mengxing; Feng, Quan; Zhao, Jian; Yang, Mei; Kang, Lijun; Wu, Lili

    2014-01-01

    Biometrics plays an important role in authentication applications since they are strongly linked to holders. With an increasing growth of e-commerce and e-government, one can expect that biometric-based authentication systems are possibly deployed over the open networks in the near future. However, due to its openness, the Internet poses a great challenge to the security and privacy of biometric authentication. Biometric data cannot be revoked, so it is of paramount importance that biometric data should be handled in a secure way. In this paper we present a scheme achieving privacy-preserving fingerprint authentication between two parties, in which fingerprint minutiae matching algorithm is completed in the encrypted domain. To improve the efficiency, we exploit homomorphic encryption as well as garbled circuits to design the protocol. Our goal is to provide protection for the security of template in storage and data privacy of two parties in transaction. The experimental results show that the proposed authentication protocol runs efficiently. Therefore, the protocol can run over open networks and help to alleviate the concerns on security and privacy of biometric applications over the open networks.

  9. Cloning nanocrystal morphology with soft templates

    Science.gov (United States)

    Thapa, Dev Kumar; Pandey, Anshu

    2016-08-01

    In most template directed preparative methods, while the template decides the nanostructure morphology, the structure of the template itself is a non-general outcome of its peculiar chemistry. Here we demonstrate a template mediated synthesis that overcomes this deficiency. This synthesis involves overgrowth of silica template onto a sacrificial nanocrystal. Such templates are used to copy the morphologies of gold nanorods. After template overgrowth, gold is removed and silver is regrown in the template cavity to produce a single crystal silver nanorod. This technique allows for duplicating existing nanocrystals, while also providing a quantifiable breakdown of the structure - shape interdependence.

  10. Attack Potential Evaluation in Desktop and Smartphone Fingerprint Sensors: Can They Be Attacked by Anyone?

    Directory of Open Access Journals (Sweden)

    Ines Goicoechea-Telleria

    2018-01-01

    Full Text Available The use of biometrics keeps growing. Every day, we use biometric recognition to unlock our phones or to have access to places such as the gym or the office, so we rely on the security manufacturers offer when protecting our privileges and private life. It is well known that it is possible to hack into a fingerprint sensor using fake fingers made of Play-Doh and other easy-to-obtain materials but to what extent? Is this true for all users or only for specialists with a deep knowledge on biometrics? Are smartphone fingerprint sensors as reliable as desktop sensors? To answer these questions, we performed 3 separate evaluations. First, we evaluated 4 desktop fingerprint sensors of different technologies by attacking them with 7 different fake finger materials. All of them were successfully attacked by an experienced attacker. Secondly, we carried out a similar test on 5 smartphones with embedded sensors using the most successful materials, which also hacked the 5 sensors. Lastly, we gathered 15 simulated attackers with no background in biometrics to create fake fingers of several materials, and they had one week to attack the fingerprint sensors of the same 5 smartphones, with the starting point of a short video with the techniques to create them. All 5 smartphones were successfully attacked by an inexperienced attacker. This paper will provide the results achieved, as well as an analysis on the attack potential of every case. All results are given following the metrics of the standard ISO/IEC 30107-3.

  11. Impact of Finger Type in Fingerprint Authentication

    Science.gov (United States)

    Gafurov, Davrondzhon; Bours, Patrick; Yang, Bian; Busch, Christoph

    Nowadays fingerprint verification system is the most widespread and accepted biometric technology that explores various features of the human fingers for this purpose. In general, every normal person has 10 fingers with different size. Although it is claimed that recognition performance with little fingers can be less accurate compared to other finger types, to our best knowledge, this has not been investigated yet. This paper presents our study on the topic of influence of the finger type into fingerprint recognition performance. For analysis we employ two fingerprint verification software packages (one public and one commercial). We conduct test on GUC100 multi sensor fingerprint database which contains fingerprint images of all 10 fingers from 100 subjects. Our analysis indeed confirms that performance with small fingers is less accurate than performance with the others fingers of the hand. It also appears that best performance is being obtained with thumb or index fingers. For example, performance deterioration from the best finger (i.e. index or thumb) to the worst fingers (i.e. small ones) can be in the range of 184%-1352%.

  12. Computing layouts with deformable templates

    KAUST Repository

    Peng, Chi-Han

    2014-07-22

    In this paper, we tackle the problem of tiling a domain with a set of deformable templates. A valid solution to this problem completely covers the domain with templates such that the templates do not overlap. We generalize existing specialized solutions and formulate a general layout problem by modeling important constraints and admissible template deformations. Our main idea is to break the layout algorithm into two steps: a discrete step to lay out the approximate template positions and a continuous step to refine the template shapes. Our approach is suitable for a large class of applications, including floorplans, urban layouts, and arts and design. Copyright © ACM.

  13. Computing layouts with deformable templates

    KAUST Repository

    Peng, Chi-Han; Yang, Yongliang; Wonka, Peter

    2014-01-01

    In this paper, we tackle the problem of tiling a domain with a set of deformable templates. A valid solution to this problem completely covers the domain with templates such that the templates do not overlap. We generalize existing specialized solutions and formulate a general layout problem by modeling important constraints and admissible template deformations. Our main idea is to break the layout algorithm into two steps: a discrete step to lay out the approximate template positions and a continuous step to refine the template shapes. Our approach is suitable for a large class of applications, including floorplans, urban layouts, and arts and design. Copyright © ACM.

  14. Distributed construction of quantum fingerprints

    OpenAIRE

    Ambainis, Andris; Shi, Yaoyun

    2003-01-01

    Quantum fingerprints are useful quantum encodings introduced by Buhrman, Cleve, Watrous, and de Wolf (Physical Review Letters, Volume 87, Number 16, Article 167902, 2001; quant-ph/0102001) in obtaining an efficient quantum communication protocol. We design a protocol for constructing the fingerprint in a distributed scenario. As an application, this protocol gives rise to a communication protocol more efficient than the best known classical protocol for a communication problem.

  15. Fingerprint signatures based on nanomagnets as markers in materials for tracing and counterfeit protection

    International Nuclear Information System (INIS)

    Szielasko, Klaus; Youssef, Amir; Sporn, Dieter; Mandel, Karl

    2016-01-01

    Identification and tracing of objects is a challenge of great current importance. Ideally, this can be achieved via small markers, which equip an object with a fingerprint identity. Herein, we communicate an approach that is based on structural arrangements of magnetic nano-entities to generate a kind of security key in an object. The nano-markers, which are applied as inks, can remotely be read out in a fast and simple way with a GMR sensor and yield an unmistakable signal pattern.Graphical abstract

  16. Fingerprint signatures based on nanomagnets as markers in materials for tracing and counterfeit protection

    Energy Technology Data Exchange (ETDEWEB)

    Szielasko, Klaus; Youssef, Amir [Fraunhofer Institute for Nondestructive Testing IZFP (Germany); Sporn, Dieter; Mandel, Karl, E-mail: karl-sebastian.mandel@isc.fraunhofer.de [Fraunhofer Institute for Silicate Research ISC (Germany)

    2016-05-15

    Identification and tracing of objects is a challenge of great current importance. Ideally, this can be achieved via small markers, which equip an object with a fingerprint identity. Herein, we communicate an approach that is based on structural arrangements of magnetic nano-entities to generate a kind of security key in an object. The nano-markers, which are applied as inks, can remotely be read out in a fast and simple way with a GMR sensor and yield an unmistakable signal pattern.Graphical abstract.

  17. Biometric Secured Result Processing Software For Nigerian Tertiary Institutions

    Directory of Open Access Journals (Sweden)

    Oladipo Oluwasegun

    2015-08-01

    Full Text Available Abstract One of the challenges facing result processing in Nigerian tertiary institutions is the problem of insecurity. Untraceable changes are made to students result and this result to various disasters such as innocent people losing their jobs since their innocence cannot be proven. Biometric based systems operate on behavioral and physiological biometric data to identify a person and grant required access to a user. Physiological characteristics such as fingerprint remains unchanged throughout an individuals life time and thus it can serve as a viable means of identifying and authenticating users who are to access a system. In this study fingerprint biometric based result processing software is developed to ensure that users are well authenticated and are made to see only what they are pre-configured to see and work with. The fingerprint authentication system was developed using visual basic.net. Staff fingerprints were enrolled into the system to form a biometric template which the system validates against at every login attempt on the result processing software. The digital personal one touch ID sdk and other libraries were used in developing the authentication system. The result processing software also ensures that all write transactions to the database are confirmed and identified by forcing another biometric authentication at the point of making a write request to the web server and associated database. This ensures that the exact person initiating the transaction was the same user who logged in to the application. The users identified at login and various confirmation milestones set for write transactions are logged into a table for future reference and audit trail. Conclusively the developed system has helped to eradicate the problem of user impersonation by ensuring only authorized users are made to access the software and in-turn participate in result processing activities.

  18. Study of noninvasive detection of latent fingerprints using UV laser

    Science.gov (United States)

    Li, Hong-xia; Cao, Jing; Niu, Jie-qing; Huang, Yun-gang; Mao, Lin-jie; Chen, Jing-rong

    2011-06-01

    Latent fingerprints present a considerable challenge in forensics, and noninvasive procedure that captures a digital image of the latent fingerprints is significant in the field of criminal investigation. The capability of photography technologies using 266nm UV Nd:YAG solid state laser as excitation light source to provide detailed images of unprocessed latent fingerprints is demonstrated. Unprocessed latent fingerprints were developed on various non-absorbent and absorbing substrates. According to the special absorption, reflection, scattering and fluorescence characterization of the various residues in fingerprints (fatty acid ester, protein, and carbosylic acid salts etc) to the UV light to weaken or eliminate the background disturbance and increase the brightness contrast of fingerprints with the background, and using 266nm UV laser as excitation light source, fresh and old latent fingerprints on the surface of four types of non-absorbent objects as magazine cover, glass, back of cellphone, wood desktop paintwork and two types of absorbing objects as manila envelope, notebook paper were noninvasive detected and appeared through reflection photography and fluorescence photography technologies, and the results meet the fingerprint identification requirements in forensic science.

  19. A Deformable Template Model, with Special Reference to Elliptical Templates

    DEFF Research Database (Denmark)

    Hobolth, Asger; Pedersen, Jan; Jensen, Eva Bjørn Vedel

    2002-01-01

    This paper suggests a high-level continuous image model for planar star-shaped objects. Under this model, a planar object is a stochastic deformation of a star-shaped template. The residual process, describing the difference between the radius-vector function of the template and the object...

  20. Holistic processing of fingerprints by expert forensic examiners.

    Science.gov (United States)

    Vogelsang, Macgregor D; Palmeri, Thomas J; Busey, Thomas A

    2017-01-01

    Holistic processing is often characterized as a process by which objects are perceived as a whole rather than a compilation of individual features. This mechanism may play an important role in the development of perceptual expertise because it allows for rapid integration across image regions. The present work explores whether holistic processing is present in latent fingerprint examiners, who compare fingerprints collected from crime scenes against a set of standards taken from a suspect. We adapted a composite task widely used in the face recognition and perceptual expertise literatures, in which participants were asked to match only a particular half of a fingerprint with a previous image while ignoring the other half. We tested both experts and novices, using both upright and inverted fingerprints. For upright fingerprints, we found weak evidence for holistic processing, but with no differences between experts and novices with respect to holistic processing. For inverted fingerprints, we found stronger evidence of holistic processing, with weak evidence for differences between experts and novices. These relatively weak holistic processing effects contrast with robust evidence for holistic processing with faces and with objects in other domains of perceptual expertise. The data constrain models of holistic processing by demonstrating that latent fingerprint experts and novices may not substantively differ in terms of the amount of holistic processing and that inverted stimuli actually produced more evidence for holistic processing than upright stimuli. Important differences between the present fingerprint stimuli and those in the literature include the lack of verbal labels for experts and the absence of strong vertical asymmetries, both of which might contribute to stronger holistic processing signatures in other stimulus domains.

  1. Cognitive Fingerprints

    Science.gov (United States)

    2015-03-25

    is another cognitive fingerprint that has been used extensively for authorship . This work has been ex- tended to authentication by relating keyboard...this work is the inference of high-level features such as personality, gender , and dominant hand but those features have not been integrated to date

  2. DNA fingerprinting in botany: past, present, future.

    Science.gov (United States)

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-03

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67-73 and Nature 1985, 316:76-79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the novel method that allowed us for the first time to discriminate between humans, animals, plants and fungi on the individual level using DNA markers. A newsletter coined "Fingerprint News" was launched, T-shirts were sold, and the proceedings of the Berne conference filled a first book on "DNA fingerprinting: approaches and applications". Four more conferences were about to follow, one on each continent, and Alec Jeffreys of course was invited to all of them. Since these early days, methodologies have undergone a rapid evolution and diversification. A multitude of techniques have been developed, optimized, and eventually abandoned when novel and more efficient and/or more reliable methods appeared. Despite some overlap between the lifetimes of the different technologies, three phases can be defined that coincide with major technological advances. Whereas the first phase of DNA fingerprinting ("the past") was dominated by restriction fragment analysis in conjunction with Southern blot hybridization, the advent of the PCR in the late 1980s gave way to the development of PCR-based single- or multi-locus profiling techniques in the second phase. Given that many routine applications of plant DNA fingerprinting still rely on PCR-based markers, we here refer to these methods as "DNA fingerprinting in the present", and include numerous examples in the present review. The beginning of the third phase actually dates back to 2005, when several novel, highly parallel DNA sequencing

  3. A novel interaction fingerprint derived from per atom score contributions: exhaustive evaluation of interaction fingerprint performance in docking based virtual screening.

    Science.gov (United States)

    Jasper, Julia B; Humbeck, Lina; Brinkjost, Tobias; Koch, Oliver

    2018-03-16

    Protein ligand interaction fingerprints are a powerful approach for the analysis and assessment of docking poses to improve docking performance in virtual screening. In this study, a novel interaction fingerprint approach (PADIF, protein per atom score contributions derived interaction fingerprint) is presented which was specifically designed for utilising the GOLD scoring functions' atom contributions together with a specific scoring scheme. This allows the incorporation of known protein-ligand complex structures for a target-specific scoring. Unlike many other methods, this approach uses weighting factors reflecting the relative frequency of a specific interaction in the references and penalizes destabilizing interactions. In addition, and for the first time, an exhaustive validation study was performed that assesses the performance of PADIF and two other interaction fingerprints in virtual screening. Here, PADIF shows superior results, and some rules of thumb for a successful use of interaction fingerprints could be identified.

  4. Optimal experiment design for magnetic resonance fingerprinting.

    Science.gov (United States)

    Bo Zhao; Haldar, Justin P; Setsompop, Kawin; Wald, Lawrence L

    2016-08-01

    Magnetic resonance (MR) fingerprinting is an emerging quantitative MR imaging technique that simultaneously acquires multiple tissue parameters in an efficient experiment. In this work, we present an estimation-theoretic framework to evaluate and design MR fingerprinting experiments. More specifically, we derive the Cramér-Rao bound (CRB), a lower bound on the covariance of any unbiased estimator, to characterize parameter estimation for MR fingerprinting. We then formulate an optimal experiment design problem based on the CRB to choose a set of acquisition parameters (e.g., flip angles and/or repetition times) that maximizes the signal-to-noise ratio efficiency of the resulting experiment. The utility of the proposed approach is validated by numerical studies. Representative results demonstrate that the optimized experiments allow for substantial reduction in the length of an MR fingerprinting acquisition, and substantial improvement in parameter estimation performance.

  5. Securing Health Sensing Using Integrated Circuit Metric

    Science.gov (United States)

    Tahir, Ruhma; Tahir, Hasan; McDonald-Maier, Klaus

    2015-01-01

    Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric) that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner. PMID:26492250

  6. Securing Health Sensing Using Integrated Circuit Metric

    Directory of Open Access Journals (Sweden)

    Ruhma Tahir

    2015-10-01

    Full Text Available Convergence of technologies from several domains of computing and healthcare have aided in the creation of devices that can help health professionals in monitoring their patients remotely. An increase in networked healthcare devices has resulted in incidents related to data theft, medical identity theft and insurance fraud. In this paper, we discuss the design and implementation of a secure lightweight wearable health sensing system. The proposed system is based on an emerging security technology called Integrated Circuit Metric (ICMetric that extracts the inherent features of a device to generate a unique device identification. In this paper, we provide details of how the physical characteristics of a health sensor can be used for the generation of hardware “fingerprints”. The obtained fingerprints are used to deliver security services like authentication, confidentiality, secure admission and symmetric key generation. The generated symmetric key is used to securely communicate the health records and data of the patient. Based on experimental results and the security analysis of the proposed scheme, it is apparent that the proposed system enables high levels of security for health monitoring in resource optimized manner.

  7. Uniqueness: skews bit occurrence frequencies in randomly generated fingerprint libraries.

    Science.gov (United States)

    Chen, Nelson G

    2016-08-01

    Requiring that randomly generated chemical fingerprint libraries have unique fingerprints such that no two fingerprints are identical causes a systematic skew in bit occurrence frequencies, the proportion at which specified bits are set. Observed frequencies (O) at which each bit is set within the resulting libraries systematically differ from frequencies at which bits are set at fingerprint generation (E). Observed frequencies systematically skew toward 0.5, with the effect being more pronounced as library size approaches the compound space, which is the total number of unique possible fingerprints given the number of bit positions each fingerprint contains. The effect is quantified for varying library sizes as a fraction of the overall compound space, and for changes in the specified frequency E. The cause and implications for this systematic skew are subsequently discussed. When generating random libraries of chemical fingerprints, the imposition of a uniqueness requirement should either be avoided or taken into account.

  8. Fingerprint recognition system by use of graph matching

    Science.gov (United States)

    Shen, Wei; Shen, Jun; Zheng, Huicheng

    2001-09-01

    Fingerprint recognition is an important subject in biometrics to identify or verify persons by physiological characteristics, and has found wide applications in different domains. In the present paper, we present a finger recognition system that combines singular points and structures. The principal steps of processing in our system are: preprocessing and ridge segmentation, singular point extraction and selection, graph representation, and finger recognition by graphs matching. Our fingerprint recognition system is implemented and tested for many fingerprint images and the experimental result are satisfactory. Different techniques are used in our system, such as fast calculation of orientation field, local fuzzy dynamical thresholding, algebraic analysis of connections and fingerprints representation and matching by graphs. Wed find that for fingerprint database that is not very large, the recognition rate is very high even without using a prior coarse category classification. This system works well for both one-to-few and one-to-many problems.

  9. Utilizing AFIS searching tools to reduce errors in fingerprint casework.

    Science.gov (United States)

    Langenburg, Glenn; Hall, Carey; Rosemarie, Quincy

    2015-12-01

    Fifty-six (56) adjudicated, property crime cases involving fingerprint evidence were reviewed using a case-specific AFIS database tool. This tool allowed fingerprint experts to search latent prints in the cases against a database of friction ridge exemplars limited to only the individuals specific to that particular case. We utilized three different methods to encode and search the latent prints: automatic feature extraction, manual encoding performed by a student intern, and manual encoding performed by a fingerprint expert. Performance in the study was strongest when the encoding was conducted by the fingerprint expert. The results of the study showed that while the AFIS tools failed to locate all of the identifications originally reported by the initial fingerprint expert that worked the case, the AFIS tools helped to identify 7 additional latent prints that were not reported by the initial fingerprint expert. We conclude that this technology, when combined with fingerprint expertise, will reduce the number of instances where an erroneous exclusion could occur, increase the efficiency of a fingerprint unit, and be a useful tool for reviewing active or cold cases for missed opportunities to report identifications. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  10. Snake Model Based on Improved Genetic Algorithm in Fingerprint Image Segmentation

    Directory of Open Access Journals (Sweden)

    Mingying Zhang

    2016-12-01

    Full Text Available Automatic fingerprint identification technology is a quite mature research field in biometric identification technology. As the preprocessing step in fingerprint identification, fingerprint segmentation can improve the accuracy of fingerprint feature extraction, and also reduce the time of fingerprint preprocessing, which has a great significance in improving the performance of the whole system. Based on the analysis of the commonly used methods of fingerprint segmentation, the existing segmentation algorithm is improved in this paper. The snake model is used to segment the fingerprint image. Additionally, it is improved by using the global optimization of the improved genetic algorithm. Experimental results show that the algorithm has obvious advantages both in the speed of image segmentation and in the segmentation effect.

  11. Artificial fingerprint recognition by using optical coherence tomography with autocorrelation analysis

    Science.gov (United States)

    Cheng, Yezeng; Larin, Kirill V.

    2006-12-01

    Fingerprint recognition is one of the most widely used methods of biometrics. This method relies on the surface topography of a finger and, thus, is potentially vulnerable for spoofing by artificial dummies with embedded fingerprints. In this study, we applied the optical coherence tomography (OCT) technique to distinguish artificial materials commonly used for spoofing fingerprint scanning systems from the real skin. Several artificial fingerprint dummies made from household cement and liquid silicone rubber were prepared and tested using a commercial fingerprint reader and an OCT system. While the artificial fingerprints easily spoofed the commercial fingerprint reader, OCT images revealed the presence of them at all times. We also demonstrated that an autocorrelation analysis of the OCT images could be potentially used in automatic recognition systems.

  12. A fingerprint classification algorithm based on combination of local and global information

    Science.gov (United States)

    Liu, Chongjin; Fu, Xiang; Bian, Junjie; Feng, Jufu

    2011-12-01

    Fingerprint recognition is one of the most important technologies in biometric identification and has been wildly applied in commercial and forensic areas. Fingerprint classification, as the fundamental procedure in fingerprint recognition, can sharply decrease the quantity for fingerprint matching and improve the efficiency of fingerprint recognition. Most fingerprint classification algorithms are based on the number and position of singular points. Because the singular points detecting method only considers the local information commonly, the classification algorithms are sensitive to noise. In this paper, we propose a novel fingerprint classification algorithm combining the local and global information of fingerprint. Firstly we use local information to detect singular points and measure their quality considering orientation structure and image texture in adjacent areas. Furthermore the global orientation model is adopted to measure the reliability of singular points group. Finally the local quality and global reliability is weighted to classify fingerprint. Experiments demonstrate the accuracy and effectivity of our algorithm especially for the poor quality fingerprint images.

  13. Efficient Filtering of Noisy Fingerprint Images

    Directory of Open Access Journals (Sweden)

    Maria Liliana Costin

    2016-01-01

    Full Text Available Fingerprint identification is an important field in the wide domain of biometrics with many applications, in different areas such: judicial, mobile phones, access systems, airports. There are many elaborated algorithms for fingerprint identification, but none of them can guarantee that the results of identification are always 100 % accurate. A first step in a fingerprint image analysing process consists in the pre-processing or filtering. If the result after this step is not by a good quality the upcoming identification process can fail. A major difficulty can appear in case of fingerprint identification if the images that should be identified from a fingerprint image database are noisy with different type of noise. The objectives of the paper are: the successful completion of the noisy digital image filtering, a novel more robust algorithm of identifying the best filtering algorithm and the classification and ranking of the images. The choice about the best filtered images of a set of 9 algorithms is made with a dual method of fuzzy and aggregation model. We are proposing through this paper a set of 9 filters with different novelty designed for processing the digital images using the following methods: quartiles, medians, average, thresholds and histogram equalization, applied all over the image or locally on small areas. Finally the statistics reveal the classification and ranking of the best algorithms.

  14. Study on Accuracy of Judgments by Chinese Fingerprint Examiners

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2015-01-01

    Full Text Available The interpretation of fingerprint evidence depends on the judgments of fingerprint examiners. This study assessed the accuracy of different judgments made by fingerprint examiners following the Analysis, Comparison, and Evaluation (ACE process. Each examiner was given five marks for analysis, comparison, and evaluation. We compared the experts′ judgments against the ground truth and used an annotation platform to evaluate how Chinese fingerprint examiners document their comparisons during the identification process. The results showed that different examiners demonstrated different accuracy of judgments and different mechanisms to reach them.

  15. Fingerprints as a Proxy for Readership of Sales Flyers

    DEFF Research Database (Denmark)

    Schmidt, Marcus J.; Krause, Niels; Solgaard, Hans Stubbe

    2007-01-01

      Can readership of sales flyers and free newspapers be estimated by revealing fingerprints? In this paper we report the results of an empirical analysis based on 4604 flyer-pages conducted to assess the feasibility of the method. Results are encouraging, and indicate that the method presently may...... serve as a conservative estimate of readership. Advertising management may thus use the fingerprints-approach as an alternative audience measure and thereby assess the convergent validity of the traditional interview method and the fingerprint approach. While the fingerprint method appears valid...

  16. A network identity authentication system based on Fingerprint identification technology

    Science.gov (United States)

    Xia, Hong-Bin; Xu, Wen-Bo; Liu, Yuan

    2005-10-01

    Fingerprint verification is one of the most reliable personal identification methods. However, most of the automatic fingerprint identification system (AFIS) is not run via Internet/Intranet environment to meet today's increasing Electric commerce requirements. This paper describes the design and implementation of the archetype system of identity authentication based on fingerprint biometrics technology, and the system can run via Internet environment. And in our system the COM and ASP technology are used to integrate Fingerprint technology with Web database technology, The Fingerprint image preprocessing algorithms are programmed into COM, which deployed on the internet information server. The system's design and structure are proposed, and the key points are discussed. The prototype system of identity authentication based on Fingerprint have been successfully tested and evaluated on our university's distant education applications in an internet environment.

  17. Capacity and optimal collusion attack channels for Gaussian fingerprinting games

    Science.gov (United States)

    Wang, Ying; Moulin, Pierre

    2007-02-01

    In content fingerprinting, the same media covertext - image, video, audio, or text - is distributed to many users. A fingerprint, a mark unique to each user, is embedded into each copy of the distributed covertext. In a collusion attack, two or more users may combine their copies in an attempt to "remove" their fingerprints and forge a pirated copy. To trace the forgery back to members of the coalition, we need fingerprinting codes that can reliably identify the fingerprints of those members. Researchers have been focusing on designing or testing fingerprints for Gaussian host signals and the mean square error (MSE) distortion under some classes of collusion attacks, in terms of the detector's error probability in detecting collusion members. For example, under the assumptions of Gaussian fingerprints and Gaussian attacks (the fingerprinted signals are averaged and then the result is passed through a Gaussian test channel), Moulin and Briassouli1 derived optimal strategies in a game-theoretic framework that uses the detector's error probability as the performance measure for a binary decision problem (whether a user participates in the collusion attack or not); Stone2 and Zhao et al. 3 studied average and other non-linear collusion attacks for Gaussian-like fingerprints; Wang et al. 4 stated that the average collusion attack is the most efficient one for orthogonal fingerprints; Kiyavash and Moulin 5 derived a mathematical proof of the optimality of the average collusion attack under some assumptions. In this paper, we also consider Gaussian cover signals, the MSE distortion, and memoryless collusion attacks. We do not make any assumption about the fingerprinting codes used other than an embedding distortion constraint. Also, our only assumptions about the attack channel are an expected distortion constraint, a memoryless constraint, and a fairness constraint. That is, the colluders are allowed to use any arbitrary nonlinear strategy subject to the above

  18. Functional Programming with C++ Template Metaprograms

    Science.gov (United States)

    Porkoláb, Zoltán

    Template metaprogramming is an emerging new direction of generative programming. With the clever definitions of templates we can force the C++ compiler to execute algorithms at compilation time. Among the application areas of template metaprograms are the expression templates, static interface checking, code optimization with adaption, language embedding and active libraries. However, as template metaprogramming was not an original design goal, the C++ language is not capable of elegant expression of metaprograms. The complicated syntax leads to the creation of code that is hard to write, understand and maintain. Although template metaprogramming has a strong relationship with functional programming, this is not reflected in the language syntax and existing libraries. In this paper we give a short and incomplete introduction to C++ templates and the basics of template metaprogramming. We will enlight the role of template metaprograms, and some important and widely used idioms. We give an overview of the possible application areas as well as debugging and profiling techniques. We suggest a pure functional style programming interface for C++ template metaprograms in the form of embedded Haskell code which is transformed to standard compliant C++ source.

  19. Chemical Fingerprinting of Materials Developed Due To Environmental Issues

    Science.gov (United States)

    Smith, Doris A.; McCool, A. (Technical Monitor)

    2000-01-01

    This paper presents viewgraphs on chemical fingerprinting of materials developed due to environmental issues. Some of the topics include: 1) Aerospace Materials; 2) Building Blocks of Capabilities; 3) Spectroscopic Techniques; 4) Chromatographic Techniques; 5) Factors that Determine Fingerprinting Approach; and 6) Fingerprinting: Combination of instrumental analysis methods that diagnostically characterize a material.

  20. [Studies on fingerprinting of Flos Buddleja by RP-HPLC].

    Science.gov (United States)

    Han, Peng; Cui, Ya-jun; Guo, Hong-zhu; Guo, De-an

    2004-10-01

    To establish fingerprinting of Flos Buddleja by using RP-HPLC for the quality control. The HPLC condition was as follows: Inertsil ODS-3 C18 analytical column (4.6 mm x 250 mm, 5 microm), gredient eluation with MeCN (0.1% TFA)-H2O (0.1%TFA), flow rate 1.0 mL x min(-1), detection wavelength 254 nm. 10 commercial samples were analyzed to establish a fingerprinting. Among the obtained fingerprinting, most of the detected peaks were separated effectively. The accuracy, repeatability and stability of this method were satisfied. The RSDs of relative retention time and area of aimed peaks which existed in all samples wereless than 5%. Theresults were in accordance with the request of fingerprinting. The established fingerprinting can be used for the quality control of Flos Buddleja.

  1. Safety and security risk assessments--now demystified!

    Science.gov (United States)

    White, Donald E

    2011-01-01

    Safety/security risk assessments no longer need to spook nor baffle healthcare safety/security managers. This grid template provides at-at-glance quick lookup of the possible threats, the affected people and things, a priority ranking of these risks, and a workable solution for each risk. Using the standard document, spreadsheet, or graphics software already available on your computer, you can easily use a scientific method to produce professional looking risk assessments that get quickly understood by both senior managers and first responders alike!

  2. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Energy Technology Data Exchange (ETDEWEB)

    Chen, C.H.; Tang, K.; Taranenko, N.I.; Allman, S.L.; Chang, L.Y.

    1994-12-31

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual`s DNA structure is identical within all tissues of their body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et al. found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endonuclease sites can provide the basis for identification. The major steps for conventional DNA fingerprinting include (1) specimen processing (2) amplification of selected DNA segments by PCR, and (3) gel electrophoresis to do the final DNA analysis. In this work we propose to use laser desorption mass spectrometry for fast DNA fingerprinting. The process and advantages are discussed.

  3. Enhanced ATM Security using Biometric Authentication and Wavelet Based AES

    Directory of Open Access Journals (Sweden)

    Sreedharan Ajish

    2016-01-01

    Full Text Available The traditional ATM terminal customer recognition systems rely only on bank cards, passwords and such identity verification methods are not perfect and functions are too single. Biometrics-based authentication offers several advantages over other authentication methods, there has been a significant surge in the use of biometrics for user authentication in recent years. This paper presents a highly secured ATM banking system using biometric authentication and wavelet based Advanced Encryption Standard (AES algorithm. Two levels of security are provided in this proposed design. Firstly we consider the security level at the client side by providing biometric authentication scheme along with a password of 4-digit long. Biometric authentication is achieved by considering the fingerprint image of the client. Secondly we ensure a secured communication link between the client machine to the bank server using an optimized energy efficient and wavelet based AES processor. The fingerprint image is the data for encryption process and 4-digit long password is the symmetric key for the encryption process. The performance of ATM machine depends on ultra-high-speed encryption, very low power consumption, and algorithmic integrity. To get a low power consuming and ultra-high speed encryption at the ATM machine, an optimized and wavelet based AES algorithm is proposed. In this system biometric and cryptography techniques are used together for personal identity authentication to improve the security level. The design of the wavelet based AES processor is simulated and the design of the energy efficient AES processor is simulated in Quartus-II software. Simulation results ensure its proper functionality. A comparison among other research works proves its superiority.

  4. FPRandom: Randomizing core browser objects to break advanced device fingerprinting techniques

    OpenAIRE

    Laperdrix , Pierre; Baudry , Benoit; Mishra , Vikas

    2017-01-01

    International audience; The rich programming interfaces (APIs) provided by web browsers can be diverted to collect a browser fingerprint. A small number of queries on these interfaces are sufficient to build a fingerprint that is statistically unique and very stable over time. Consequently, the fingerprint can be used to track users. Our work aims at mitigating the risk of browser fingerprinting for users privacy by 'breaking' the stability of a fingerprint over time. We add randomness in the...

  5. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    Directory of Open Access Journals (Sweden)

    Rohit M Thanki

    2016-08-01

    Full Text Available Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to secure vulnerable point like protection of biometric templates at the communication channel of biometric authentication systems. A compressive sensing theory procedure is used for generation of sparse information on watermark biometric data using detail wavelet coefficients. Then sparse information of watermark biometric data is embedded into DCT coefficients of host biometric data. This proposed scheme is robust to common signal processing and geometric attacks like JPEG compression, adding noise, filtering, and cropping, histogram equalization. This proposed scheme has more advantages and high quality measures compared to existing schemes in the literature.

  6. Templates, Numbers & Watercolors.

    Science.gov (United States)

    Clemesha, David J.

    1990-01-01

    Describes how a second-grade class used large templates to draw and paint five-digit numbers. The lesson integrated artistic knowledge and vocabulary with their mathematics lesson in place value. Students learned how draftspeople use templates, and they studied number paintings by Charles Demuth and Jasper Johns. (KM)

  7. Straightforward fabrication of black nano silica dusting powder for latent fingerprint imaging

    Science.gov (United States)

    Komalasari, Isna; Krismastuti, Fransiska Sri Herwahyu; Elishian, Christine; Handayani, Eka Mardika; Nugraha, Willy Cahya; Ketrin, Rosi

    2017-11-01

    Imaging of latent fingerprint pattern (aka fingermark) is one of the most important and accurate detection methods in forensic investigation because of the characteristic of individual fingerprint. This detection technique relies on the mechanical adherence of fingerprint powder to the moisture and oily component of the skin left on the surface. The particle size of fingerprint powder is one of the critical parameter to obtain excellent fingerprint image. This study develops a simple, cheap and straightforward method to fabricate Nano size black dusting fingerprint powder based on Nano silica and applies the powder to visualize latent fingerprint. The nanostructured silica was prepared from tetraethoxysilane (TEOS) and then modified with Nano carbon, methylene blue and sodium acetate to color the powder. Finally, as a proof-of-principle, the ability of this black Nano silica dusting powder to image latent fingerprint is successfully demonstrated and the results show that this fingerprint powder provides clearer fingerprint pattern compared to the commercial one highlighting the potential application of the nanostructured silica in forensic science.

  8. Making DNA Fingerprints.

    Science.gov (United States)

    Nunley, Kathie F.

    1996-01-01

    Presents an activity to simulate electrophoresis using everyday items. Uses adding machine paper to construct a set of DNA fingerprints that can be used to solve crime cases designed by students in any biology class. (JRH)

  9. Recognition of explosives fingerprints on objects for courier services using machine learning methods and laser-induced breakdown spectroscopy.

    Science.gov (United States)

    Moros, J; Serrano, J; Gallego, F J; Macías, J; Laserna, J J

    2013-06-15

    During recent years laser-induced breakdown spectroscopy (LIBS) has been considered one of the techniques with larger ability for trace detection of explosives. However, despite of the high sensitivity exhibited for this application, LIBS suffers from a limited selectivity due to difficulties in assigning the molecular origin of the spectral emissions observed. This circumstance makes the recognition of fingerprints a latent challenging problem. In the present manuscript the sorting of six explosives (chloratite, ammonal, DNT, TNT, RDX and PETN) against a broad list of potential harmless interferents (butter, fuel oil, hand cream, olive oil, …), all of them in the form of fingerprints deposited on the surfaces of objects for courier services, has been carried out. When LIBS information is processed through a multi-stage architecture algorithm built from a suitable combination of 3 learning classifiers, an unknown fingerprint may be labeled into a particular class. Neural network classifiers trained by the Levenberg-Marquardt rule were decided within 3D scatter plots projected onto the subspace of the most useful features extracted from the LIBS spectra. Experimental results demonstrate that the presented algorithm sorts fingerprints according to their hazardous character, although its spectral information is virtually identical in appearance, with rates of false negatives and false positives not beyond of 10%. These reported achievements mean a step forward in the technology readiness level of LIBS for this complex application related to defense, homeland security and force protection. Copyright © 2013 Elsevier B.V. All rights reserved.

  10. Vitality detection in personal authentication systems using fingerprints

    OpenAIRE

    Coli, Pietro

    2008-01-01

    Fingerprints are considered as the sign of each human being, and this has contributed the development of biometric applications based on such features. Since 2002, an important vulnerability has been shown: it is possible to deceive fingerprint scanners through artificial replicas of fingertips. In order to address this shortcoming it is need to recognize a spoofing attempt with artificial fingers looking for some “life signs” each time an user submit a fingerprint (vitality detection problem...

  11. MULTIMODAL BIOMETRIC AUTHENTICATION USING PARTICLE SWARM OPTIMIZATION ALGORITHM WITH FINGERPRINT AND IRIS

    Directory of Open Access Journals (Sweden)

    A. Muthukumar

    2012-02-01

    Full Text Available In general, the identification and verification are done by passwords, pin number, etc., which is easily cracked by others. In order to overcome this issue biometrics is a unique tool for authenticate an individual person. Nevertheless, unimodal biometric is suffered due to noise, intra class variations, spoof attacks, non-universality and some other attacks. In order to avoid these attacks, the multimodal biometrics i.e. combining of more modalities is adapted. In a biometric authentication system, the acceptance or rejection of an entity is dependent on the similarity score falling above or below the threshold. Hence this paper has focused on the security of the biometric system, because compromised biometric templates cannot be revoked or reissued and also this paper has proposed a multimodal system based on an evolutionary algorithm, Particle Swarm Optimization that adapts for varying security environments. With these two concerns, this paper had developed a design incorporating adaptability, authenticity and security.

  12. Minute-made and low carbon fingerprint microwave synthesis of high quality templated mesoporous silica

    KAUST Repository

    Chaignon, J.; Bouizi, Y.; Davin, L.; Calin, N.; Albela, B.; Bonneviot, L.

    2015-01-01

    © The Royal Society of Chemistry 2015. Hexagonal mesostructured templated silicas were produced in less than 10 minutes using an ultra-fast microwave assisted hydrothermal synthesis. Typically, 10 g can be prepared at once in a commercial microwave device usually devoted to analytical digestion. Undesired alcohol side-products were avoided using inexpensive water colloidal silica instead of silicon alkoxides as the silicon source. In comparison with classical heating activation, the absence of pore expansion and pore wall thickening even for synthesis temperatures as high as 190 °C evidenced that heat transfer and diffusion of matter had no time to take place. Comparison between the chemically extracted and calcined samples shows that the structure was better stabilized for autoclaving above 150 °C. However, a fast temperature ramping and final temperatures above 180 °C were required to sear structures of the highest quality comparable to that of the best conventional methods. This is rationalized by assuming a sequential flake-by-flake assembly of the pore-wall at the micelle palisade. Notably, tosylate counterions yielded better structural characteristics than bromide counterions and allowed better opportunities for surfactant recycling.

  13. The thermodynamics of latent fingerprint corrosion of metal elements and alloys.

    Science.gov (United States)

    Bond, John W

    2008-11-01

    Redox reactions taking place between the surface of a metal and fingerprint residue have been expressed thermodynamically in terms of both the Nernst equation for reduction potential and the complexation constant for the formation of complex metal halide ions in aqueous solution. These expressions are used to explain experimental results for the corrosion of 10 different metal elements by fingerprint residue in air at room temperature. Corrosion of noble metals, such as silver and gold, supports the proposition that the degree of metal corrosion is enhanced by the presence of chloride ions in eccrine sweat. Extending the experiments to include 10 metal alloys enabled the construction of a fingerprint corrosion series for 20 different metals. Fingerprint corrosion on metals alloyed with > approximately 40% copper was found to display third level fingerprint detail. A comparison of both conventional ink on paper and digital (Livescan) fingerprinting techniques with fingerprints deposited on 9 Karat gold alloy has shown that gold alloy depositions are least susceptible to third level detail obliteration by poor fingerprint capturing techniques.

  14. Multi-template polymerase chain reaction.

    Science.gov (United States)

    Kalle, Elena; Kubista, Mikael; Rensing, Christopher

    2014-12-01

    PCR is a formidable and potent technology that serves as an indispensable tool in a wide range of biological disciplines. However, due to the ease of use and often lack of rigorous standards many PCR applications can lead to highly variable, inaccurate, and ultimately meaningless results. Thus, rigorous method validation must precede its broad adoption to any new application. Multi-template samples possess particular features, which make their PCR analysis prone to artifacts and biases: multiple homologous templates present in copy numbers that vary within several orders of magnitude. Such conditions are a breeding ground for chimeras and heteroduplexes. Differences in template amplification efficiencies and template competition for reaction compounds undermine correct preservation of the original template ratio. In addition, the presence of inhibitors aggravates all of the above-mentioned problems. Inhibitors might also have ambivalent effects on the different templates within the same sample. Yet, no standard approaches exist for monitoring inhibitory effects in multitemplate PCR, which is crucial for establishing compatibility between samples.

  15. Fingerprinting Mobile Devices Using Personalized Configurations

    Directory of Open Access Journals (Sweden)

    Kurtz Andreas

    2016-01-01

    Full Text Available Recently, Apple removed access to various device hardware identifiers that were frequently misused by iOS third-party apps to track users. We are, therefore, now studying the extent to which users of smartphones can still be uniquely identified simply through their personalized device configurations. Using Apple’s iOS as an example, we show how a device fingerprint can be computed using 29 different configuration features. These features can be queried from arbitrary thirdparty apps via the official SDK. Experimental evaluations based on almost 13,000 fingerprints from approximately 8,000 different real-world devices show that (1 all fingerprints are unique and distinguishable; and (2 utilizing a supervised learning approach allows returning users or their devices to be recognized with a total accuracy of 97% over time

  16. Report: Fiscal Year 2010 Federal Information Security Management Act Report

    Science.gov (United States)

    Report #11-P-0017, November 16, 2010. Attached is the Office of Inspector General’s (OIG’s) Fiscal Year 2010 Federal Information Security Management Act (FISMA) Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  17. An investigation on the problem of thinning in fingerprint processing ...

    African Journals Online (AJOL)

    A high-integrity thinning procedure for binarised fingerprints is proposed in this paper. Several authors and software developers have approached the thinning problems in fingerprint-processing differently. Their approach produced in most cases, fingerprint skeletons with low reli abi lity and thus require additional ...

  18. Towards a complete rule-based classification approach for flat fingerprints

    CSIR Research Space (South Africa)

    Webb, L

    2014-12-01

    Full Text Available fingerprints. This work implements an algorithm which includes new rules to account for more instances of flat fingerprints with missing singular points, specifically when the delta of a Right Loop or Left Loop fingerprint is not captured, when one of the loops...

  19. Extracting subsurface fingerprints using optical coherence tomography

    CSIR Research Space (South Africa)

    Akhoury, SS

    2015-02-01

    Full Text Available Subsurface Fingerprints using Optical Coherence Tomography Sharat Saurabh Akhoury, Luke Nicholas Darlow Modelling and Digital Science, Council for Scientific and Industrial Research, Pretoria, South Africa Abstract Physiologists have found... approach to extract the subsurface fingerprint representation using a high-resolution imaging technology known as Optical Coherence Tomography (OCT). ...

  20. Emergency department documentation templates: variability in template selection and association with physical examination and test ordering in dizziness presentations

    Directory of Open Access Journals (Sweden)

    Meurer William J

    2011-03-01

    Full Text Available Abstract Background Clinical documentation systems, such as templates, have been associated with process utilization. The T-System emergency department (ED templates are widely used but lacking are analyses of the templates association with processes. This system is also unique because of the many different template options available, and thus the selection of the template may also be important. We aimed to describe the selection of templates in ED dizziness presentations and to investigate the association between items on templates and process utilization. Methods Dizziness visits were captured from a population-based study of EDs that use documentation templates. Two relevant process outcomes were assessed: head computerized tomography (CT scan and nystagmus examination. Multivariable logistic regression was used to estimate the probability of each outcome for patients who did or did not receive a relevant-item template. Propensity scores were also used to adjust for selection effects. Results The final cohort was 1,485 visits. Thirty-one different templates were used. Use of a template with a head CT item was associated with an increase in the adjusted probability of head CT utilization from 12.2% (95% CI, 8.9%-16.6% to 29.3% (95% CI, 26.0%-32.9%. The adjusted probability of documentation of a nystagmus assessment increased from 12.0% (95%CI, 8.8%-16.2% when a nystagmus-item template was not used to 95.0% (95% CI, 92.8%-96.6% when a nystagmus-item template was used. The associations remained significant after propensity score adjustments. Conclusions Providers use many different templates in dizziness presentations. Important differences exist in the various templates and the template that is used likely impacts process utilization, even though selection may be arbitrary. The optimal design and selection of templates may offer a feasible and effective opportunity to improve care delivery.

  1. Detection and analysis of diamond fingerprinting feature and its application

    Energy Technology Data Exchange (ETDEWEB)

    Li Xin; Huang Guoliang; Li Qiang; Chen Shengyi, E-mail: tshgl@tsinghua.edu.cn [Department of Biomedical Engineering, the School of Medicine, Tsinghua University, Beijing, 100084 (China)

    2011-01-01

    Before becoming a jewelry diamonds need to be carved artistically with some special geometric features as the structure of the polyhedron. There are subtle differences in the structure of this polyhedron in each diamond. With the spatial frequency spectrum analysis of diamond surface structure, we can obtain the diamond fingerprint information which represents the 'Diamond ID' and has good specificity. Based on the optical Fourier Transform spatial spectrum analysis, the fingerprinting identification of surface structure of diamond in spatial frequency domain was studied in this paper. We constructed both the completely coherent diamond fingerprinting detection system illuminated by laser and the partially coherent diamond fingerprinting detection system illuminated by led, and analyzed the effect of the coherence of light source to the diamond fingerprinting feature. We studied rotation invariance and translation invariance of the diamond fingerprinting and verified the feasibility of real-time and accurate identification of diamond fingerprint. With the profit of this work, we can provide customs, jewelers and consumers with a real-time and reliable diamonds identification instrument, which will curb diamond smuggling, theft and other crimes, and ensure the healthy development of the diamond industry.

  2. Quality and matching performance analysis of three-dimensional unraveled fingerprints

    Science.gov (United States)

    Wang, Yongchang; Hao, Qi; Fatehpuria, Abhishika; Hassebrook, Laurence G.; Lau, Daniel L.

    2010-07-01

    The use of fingerprints as a biometric is both the oldest mode of computer-aided personal identification and the most-relied-on technology in use today. However, current acquisition methods have some challenging and peculiar difficulties. For higher performance fingerprint data acquisition and verification, a novel noncontact 3-D fingerprint scanner is investigated, where both the detailed 3-D and albedo information of the finger is obtained. The obtained high-resolution 3-D prints are further converted into 3-D unraveled prints, to be compatible with traditional 2-D automatic fingerprint identification systems. As a result, many limitations imposed on conventional fingerprint capture and processing can be reduced by the unobtrusiveness of this approach and the extra depth information acquired. To compare the quality and matching performances of 3-D unraveled with traditional 2-D plain fingerprints, we collect both 3-D prints and their 2-D plain counterparts. The print quality and matching performances are evaluated and analyzed by using National Institute of Standard Technology fingerprint software. Experimental results show that the 3-D unraveled print outperforms the 2-D print in both quality and matching performances.

  3. Visa Security Policy: Roles of the Departments of State and Homeland Sec

    Science.gov (United States)

    2010-03-08

    report pursuant to S. Res.137., committee print, 81st Cong., 2nd sess., April 20, 1950. 11 8 U.S.C. 1104 . 12 8 U.S.C. 1201. Visa Security Policy...Biometric 2-print fingerprint system (IDENT); and Advanced Passenger Information System ( APIS ). They also have access to selected legacy- INS

  4. 3D fingerprint imaging system based on full-field fringe projection profilometry

    Science.gov (United States)

    Huang, Shujun; Zhang, Zonghua; Zhao, Yan; Dai, Jie; Chen, Chao; Xu, Yongjia; Zhang, E.; Xie, Lili

    2014-01-01

    As an unique, unchangeable and easily acquired biometrics, fingerprint has been widely studied in academics and applied in many fields over the years. The traditional fingerprint recognition methods are based on the obtained 2D feature of fingerprint. However, fingerprint is a 3D biological characteristic. The mapping from 3D to 2D loses 1D information and causes nonlinear distortion of the captured fingerprint. Therefore, it is becoming more and more important to obtain 3D fingerprint information for recognition. In this paper, a novel 3D fingerprint imaging system is presented based on fringe projection technique to obtain 3D features and the corresponding color texture information. A series of color sinusoidal fringe patterns with optimum three-fringe numbers are projected onto a finger surface. From another viewpoint, the fringe patterns are deformed by the finger surface and captured by a CCD camera. 3D shape data of the finger can be obtained from the captured fringe pattern images. This paper studies the prototype of the 3D fingerprint imaging system, including principle of 3D fingerprint acquisition, hardware design of the 3D imaging system, 3D calibration of the system, and software development. Some experiments are carried out by acquiring several 3D fingerprint data. The experimental results demonstrate the feasibility of the proposed 3D fingerprint imaging system.

  5. Generation of DNA profiles from fingerprints developed with columnar thin film technique.

    Science.gov (United States)

    Plazibat, Stephanie L; Roy, Reena; Swiontek, Stephen E; Lakhtakia, Akhlesh

    2015-12-01

    Partial-bloody fingerprints and partial fingerprints with saliva are often encountered at crime scenes, potentially enabling the combination of fingerprint and DNA analyses for absolute identification, provided that the development technique for fingerprint analysis does not inhibit DNA analysis. 36 partial-bloody fingerprints and 30 fingerprints wetted with saliva, all deposited on brass, were first developed using the columnar-thin-film (CTF) technique and then subjected to short tandem repeat (STR) DNA analysis. Equal numbers of samples were subjected to the same DNA analysis without development. Tris (8-hydroxyquinolinato) aluminum, or Alq3, was evaporated to deposit CTFs for development of the prints. DNA was extracted from all 132 samples, quantified, and amplified with AmpFlSTR(®) Identifiler Plus Amplification Kit. Additionally, DNA analyses were conducted on four blood smears on un-fingerprinted brass that had been subjected to CTF deposition and four blood smears on un-fingerprinted brass that had not been subjected to CTF deposition. Complete and concordant autosomal STR profiles of the same quality were obtained from both undeveloped and CTF-developed fingerprints, indicating that CTF development of fingerprints preserves DNA and does not inhibit subsequent DNA analysis. Even when there were no fingerprints, CTF deposition did not lead to inhibition of DNA analysis. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  6. On Realistically Attacking Tor with Website Fingerprinting

    Directory of Open Access Journals (Sweden)

    Wang Tao

    2016-10-01

    Full Text Available Website fingerprinting allows a local, passive observer monitoring a web-browsing client’s encrypted channel to determine her web activity. Previous attacks have shown that website fingerprinting could be a threat to anonymity networks such as Tor under laboratory conditions. However, there are significant differences between laboratory conditions and realistic conditions. First, in laboratory tests we collect the training data set together with the testing data set, so the training data set is fresh, but an attacker may not be able to maintain a fresh data set. Second, laboratory packet sequences correspond to a single page each, but for realistic packet sequences the split between pages is not obvious. Third, packet sequences may include background noise from other types of web traffic. These differences adversely affect website fingerprinting under realistic conditions. In this paper, we tackle these three problems to bridge the gap between laboratory and realistic conditions for website fingerprinting. We show that we can maintain a fresh training set with minimal resources. We demonstrate several classification-based techniques that allow us to split full packet sequences effectively into sequences corresponding to a single page each. We describe several new algorithms for tackling background noise. With our techniques, we are able to build the first website fingerprinting system that can operate directly on packet sequences collected in the wild.

  7. Robust and Secure Watermarking Using Sparse Information of Watermark for Biometric Data Protection

    OpenAIRE

    Rohit M Thanki; Ved Vyas Dwivedi; Komal Borisagar

    2016-01-01

    Biometric based human authentication system is used for security purpose in many organizations in the present world. This biometric authentication system has several vulnerable points. Two of vulnerable points are protection of biometric templates at system database and protection of biometric templates at communication channel between two modules of biometric authentication systems. In this paper proposed a robust watermarking scheme using the sparse information of watermark biometric to sec...

  8. Efficient internal and surface fingerprint extraction and blending using optical coherence tomography.

    Science.gov (United States)

    Darlow, Luke Nicholas; Connan, James

    2015-11-01

    Optical coherence tomography provides a 3D representation of fingertip skin where surface and internal fingerprints are found. These fingerprints are topographically identical. However, the surface skin is prone to damage, distortion, and spoofing; and the internal fingerprint is difficult to access and extract. This research presents a novel scaling-resolution approach to fingerprint zone detection and extraction. Furthermore, a local-quality-based blending procedure is also proposed. The accuracy of the zone-detection algorithm is comparable to an earlier work, yielding a mean-squared error of 25.9 and structural similarity of 95.8% (compared to a ground-truth estimate). Blending the surface and internal fingerprints improved the National Institute of Science and Technology's Fingerprint Image Quality scores and the average maximum match scores (when matched against conventional surface counterparts). The fingerprint blending procedure was able to combine high-quality regions from both fingerprints, thus mitigating surface wrinkles and anomalous poor-quality regions. Furthermore, spoof detection via a surface-to-internal fingerprint comparison was proposed and tested.

  9. DNA Fingerprinting in a Forensic Teaching Experiment

    Science.gov (United States)

    Wagoner, Stacy A.; Carlson, Kimberly A.

    2008-01-01

    This article presents an experiment designed to provide students, in a classroom laboratory setting, a hands-on demonstration of the steps used in DNA forensic analysis by performing DNA extraction, DNA fingerprinting, and statistical analysis of the data. This experiment demonstrates how DNA fingerprinting is performed and how long it takes. It…

  10. 8 CFR 236.5 - Fingerprints and photographs.

    Science.gov (United States)

    2010-01-01

    ... 8 Aliens and Nationality 1 2010-01-01 2010-01-01 false Fingerprints and photographs. 236.5 Section... to Order of Removal § 236.5 Fingerprints and photographs. Every alien 14 years of age or older... photographs shall be made available to Federal, State, and local law enforcement agencies upon request to the...

  11. Application of DNA fingerprints for cell-line individualization.

    Science.gov (United States)

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-09-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they differ. The average percent difference (APD) among pairwise combinations from the population of 33 unrelated cell lines was 76.9%, compared with the APD in band sharing among cell lines derived from the same individual (less than or equal to 1.2%). Included in this survey were nine additional cell lines previously implicated as HeLa cell derivatives, and these lines were clearly confirmed as such by DNA fingerprints (APD less than or equal to 0.6%). On the basis of fragment frequencies in the tested cell line population, a simple genetic model was developed to estimate the frequencies of each DNA fingerprint in the population. The median incidence was 2.9 X 10(-17), and the range was 2.4 X 10(-21) to 6.6 X 10(-15). This value approximates the probability that a second cell line selected at random from unrelated individuals will match a given DNA fingerprint. Related calculations address the chance that any two DNA fingerprints would be identical among a large group of cell lines. This estimate is still very slight; for example, the chance of two or more common DNA fingerprints among 1 million distinct individuals is less than .001. The procedure provides a straightforward, easily interpreted, and statistically robust method for identification and individualization of human cells.

  12. The Ins and Outs of DNA Fingerprinting the Infectious Fungi

    Science.gov (United States)

    Soll, David R.

    2000-01-01

    DNA fingerprinting methods have evolved as major tools in fungal epidemiology. However, no single method has emerged as the method of choice, and some methods perform better than others at different levels of resolution. In this review, requirements for an effective DNA fingerprinting method are proposed and procedures are described for testing the efficacy of a method. In light of the proposed requirements, the most common methods now being used to DNA fingerprint the infectious fungi are described and assessed. These methods include restriction fragment length polymorphisms (RFLP), RFLP with hybridization probes, randomly amplified polymorphic DNA and other PCR-based methods, electrophoretic karyotyping, and sequencing-based methods. Procedures for computing similarity coefficients, generating phylogenetic trees, and testing the stability of clusters are then described. To facilitate the analysis of DNA fingerprinting data, computer-assisted methods are described. Finally, the problems inherent in the collection of test and control isolates are considered, and DNA fingerprinting studies of strain maintenance during persistent or recurrent infections, microevolution in infecting strains, and the origin of nosocomial infections are assessed in light of the preceding discussion of the ins and outs of DNA fingerprinting. The intent of this review is to generate an awareness of the need to verify the efficacy of each DNA fingerprinting method for the level of genetic relatedness necessary to answer the epidemiological question posed, to use quantitative methods to analyze DNA fingerprint data, to use computer-assisted DNA fingerprint analysis systems to analyze data, and to file data in a form that can be used in the future for retrospective and comparative studies. PMID:10756003

  13. Partial Device Fingerprints

    NARCIS (Netherlands)

    Ciere, M.; Hernandez Ganan, C.; van Eeten, M.J.G.

    2017-01-01

    In computing, remote devices may be identified by means of device fingerprinting, which works by collecting a myriad of clientside attributes such as the device’s browser and operating system version, installed plugins, screen resolution, hardware artifacts, Wi-Fi settings, and anything else

  14. Diversity of DNA fingerprints in Cryptococcus neoformans.

    Science.gov (United States)

    Varma, A; Swinne, D; Staib, F; Bennett, J E; Kwon-Chung, K J

    1995-07-01

    DNA fingerprint patterns of 156 Cryptococcus neoformans isolates (26 AIDS patients, 46 non-AIDS patients, and 40 environmental sources) from both varieties (126 C. neoformans var. neoformans and 30 C. neoformans var. gattii isolates) and from seven countries were analyzed by using the DNA probe UT-4p. Nine and twelve distinct DNA fingerprint patterns were observed for isolates of the C. neoformans var. neoformans and var. gattii, respectively. No pattern was unique to AIDS patients, non-AIDS patients, or the environment. Pattern II was observed more often in non-AIDS patients (8 of 23) than in AIDS patients (0 of 25). Pattern V was the most prevalent pattern (42 of 82) in clinical and environmental isolates. Isolates from three AIDS patients in Burundi and Zaire exhibited patterns identical to each other but different from those of isolates collected from their houses (i.e., dust of floors, walls, etc.) or a nearby pigeon coop. DNA fingerprint stability was determined for 53 isolates from nine non-AIDS patients at different time intervals during 5 to 128 weeks of antifungal therapy. For eight patients, the fingerprint pattern was stable while the ninth may have had a mixed infection. Pattern II was observed in 4 of 9 patients, which is similar to 4 of 14 in other non-AIDS patients as reported here. In spite of the extensive pattern heterogeneity among 15 C. neoformans var. gattii isolates in Australia, the patterns observed in seven California isolates were quite different from those in Australia. Among isolates of C. neoformans var. gattii, one fingerprint pattern (designated b) was observed in several countries of the Far East. The fingerprint patterns of two of three environmental isolates from Eucalyptus camaldulensis trees in Australia were identical to those of 2 of the 12 clinical isolates from the country.

  15. Multi-template polymerase chain reaction

    Directory of Open Access Journals (Sweden)

    Elena Kalle

    2014-12-01

    Full Text Available PCR is a formidable and potent technology that serves as an indispensable tool in a wide range of biological disciplines. However, due to the ease of use and often lack of rigorous standards many PCR applications can lead to highly variable, inaccurate, and ultimately meaningless results. Thus, rigorous method validation must precede its broad adoption to any new application. Multi-template samples possess particular features, which make their PCR analysis prone to artifacts and biases: multiple homologous templates present in copy numbers that vary within several orders of magnitude. Such conditions are a breeding ground for chimeras and heteroduplexes. Differences in template amplification efficiencies and template competition for reaction compounds undermine correct preservation of the original template ratio. In addition, the presence of inhibitors aggravates all of the above-mentioned problems. Inhibitors might also have ambivalent effects on the different templates within the same sample. Yet, no standard approaches exist for monitoring inhibitory effects in multitemplate PCR, which is crucial for establishing compatibility between samples.

  16. Hard template synthesis of metal nanowires

    Science.gov (United States)

    Kawamura, Go; Muto, Hiroyuki; Matsuda, Atsunori

    2014-11-01

    Metal nanowires (NWs) have attracted much attention because of their high electron conductivity, optical transmittance and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production of composite devices. The resulting NWs are immobilized and spatially arranged, as dictated by the ordered porous structure of the template. This avoids the NWs from aggregating, which is common for NWs prepared with soft templates in solution. Herein, the hard template synthesis of metal NWs is reviewed, and the resulting structures, properties and potential applications are discussed.

  17. Studies on Chromatographic Fingerprint and Fingerprinting Profile-Efficacy Relationship of Polygoni Perfoliati Herba

    Directory of Open Access Journals (Sweden)

    Li Tian

    2013-01-01

    Full Text Available Polygoni Perfoliati Herba is widely used in China with antibacterium, anti-inflammatory, expectorant, antitumor, and antivirus activities. To reveal the mechanisms of the activities of Polygoni Perfoliati Herba, the relationship between the fingerprinting profile and its bioactivities was investigated. In the present study, high-performance liquid chromatographic (HPLC fingerprinting method was developed. The established method was applied to analyze 51 batches of Polygoni Perfoliati Herba samples collected from different locations or in different harvesting times in China. Chemometrics, including similarity analysis, hierarchical clustering analysis, and principal component analysis, were used to express their similarities. It was found that similarity values of the samples were in the range of 0.432–0.998. The results of analgesic tests indicated that Polygoni Perfoliati Herba could significantly inhibit pain induced by hot plate and acetic acid in mice. The results of anti-inflammatory tests showed that Polygoni Perfoliati Herba had good anti-inflammatory effects (P < 0.01 in two models including dimethyl benzene-induced ear edema and acetic acid-induced peritoneal permeability in mice. Combining the results from chromatographic fingerprints with those from bioactivities, we found that seven peaks from Polygoni Perfoliati Herba were mainly responsible for analgesic and anti-inflammatory activities.

  18. Teaching DNA Fingerprinting using a Hands-on Simulation.

    Science.gov (United States)

    Schug, Thatcher

    1998-01-01

    Presents an inexpensive hands-on lesson in DNA fingerprinting that can be completed in a single class period. Involves students in solving a murder in which a drop of blood is fingerprinted and matched with the blood of the murderer. (DDR)

  19. iTemplate: A template-based eye movement data analysis approach.

    Science.gov (United States)

    Xiao, Naiqi G; Lee, Kang

    2018-02-08

    Current eye movement data analysis methods rely on defining areas of interest (AOIs). Due to the fact that AOIs are created and modified manually, variances in their size, shape, and location are unavoidable. These variances affect not only the consistency of the AOI definitions, but also the validity of the eye movement analyses based on the AOIs. To reduce the variances in AOI creation and modification and achieve a procedure to process eye movement data with high precision and efficiency, we propose a template-based eye movement data analysis method. Using a linear transformation algorithm, this method registers the eye movement data from each individual stimulus to a template. Thus, users only need to create one set of AOIs for the template in order to analyze eye movement data, rather than creating a unique set of AOIs for all individual stimuli. This change greatly reduces the error caused by the variance from manually created AOIs and boosts the efficiency of the data analysis. Furthermore, this method can help researchers prepare eye movement data for some advanced analysis approaches, such as iMap. We have developed software (iTemplate) with a graphic user interface to make this analysis method available to researchers.

  20. DNA fingerprinting of the NCI-60 cell line panel.

    Science.gov (United States)

    Lorenzi, Philip L; Reinhold, William C; Varma, Sudhir; Hutchinson, Amy A; Pommier, Yves; Chanock, Stephen J; Weinstein, John N

    2009-04-01

    The National Cancer Institute's NCI-60 cell line panel, the most extensively characterized set of cells in existence and a public resource, is frequently used as a screening tool for drug discovery. Because many laboratories around the world rely on data from the NCI-60 cells, confirmation of their genetic identities represents an essential step in validating results from them. Given the consequences of cell line contamination or misidentification, quality control measures should routinely include DNA fingerprinting. We have, therefore, used standard DNA microsatellite short tandem repeats to profile the NCI-60, and the resulting DNA fingerprints are provided here as a reference. Consistent with previous reports, the fingerprints suggest that several NCI-60 lines have common origins: the melanoma lines MDA-MB-435, MDA-N, and M14; the central nervous system lines U251 and SNB-19; the ovarian lines OVCAR-8 and OVCAR-8/ADR (also called NCI/ADR); and the prostate lines DU-145, DU-145 (ATCC), and RC0.1. Those lines also show that the ability to connect two fingerprints to the same origin is not affected by stable transfection or by the development of multidrug resistance. As expected, DNA fingerprints were not able to distinguish different tissues-of-origin. The fingerprints serve principally as a barcodes.

  1. Software defined wireless sensor networks security challenges

    CSIR Research Space (South Africa)

    Kgogo, T

    2017-09-01

    Full Text Available party development [28]. Moreover, there is a new attack that fingerprints SDN network and launches more efficient resource consumption attacks like DDoS. In general, SDN security vulnerabilities comes from the absence of integration with existing... resilience in NOX that uses its component organization. Moreover, a Primary-Backup method was introduced to enhanve the resilience of the SDN. “SDN-based DDoS blocking scheme” [38] DoS/DDoS attack specifically on the controller DDoS Blocking...

  2. An Efficient Automatic Attendance System Using Fingerprint Reconstruction Technique

    OpenAIRE

    Ramakrishnan, Josphineleela; Ramakrishnan, M.

    2012-01-01

    Biometric time and attendance system is one of the most successful applications of biometric technology. One of the main advantage of a biometric time and attendance system is it avoids "buddy-punching". Buddy punching was a major loophole which will be exploiting in the traditional time attendance systems. Fingerprint recognition is an established field today, but still identifying individual from a set of enrolled fingerprints is a time taking process. Most fingerprint-based biometric syste...

  3. Friction ridge skin - Automated Fingerprint Identification System (AFIS)

    NARCIS (Netherlands)

    Meuwly, Didier

    2013-01-01

    This contribution describes the development and the forensic use of automated fingerprint identification systems (AFISs). AFISs were initially developed in order to overcome the limitations of the paper-based fingerprint collections, by digitizing the ten-print cards in computerized databases and to

  4. Rotation-invariant fingerprint matching using radon and DCT

    Indian Academy of Sciences (India)

    Sangita Bharkad

    2017-11-20

    Nov 20, 2017 ... [6] Bazen A and Gerez S 2003 Fingerprint matching by thin- plate spline modeling of elastic deformations. Pattern. Recogn. 36(8): 1859–1867. [7] Jain A, Hong L and Bolle R 1997 On-line fingerprint veri- fication. IEEE Trans.

  5. The Development Of Mathematical Model For Automated Fingerprint Identification Systems Analysis

    International Nuclear Information System (INIS)

    Ardisasmita, M. Syamsa

    2001-01-01

    Fingerprint has a strong oriented and periodic structure composed of dark lines of raised skin (ridges) and clear lines of lowered skin (furrows)that twist to form a distinct pattern. Although the manner in which the ridges flow is distinctive, other characteristics of the fingerprint called m inutiae a re what are most unique to the individual. These features are particular patterns consisting of terminations or bifurcations of the ridges. To assert if two fingerprints are from the same finger or not, experts detect those minutiae. AFIS (Automated Fingerprint Identification Systems) extract and compare these features for determining a match. The classic methods of fingerprints recognition are not suitable for direct implementation in form of computer algorithms. The creation of a finger's model was however the necessity of development of new, better algorithms of analysis. This paper presents a new numerical methods of fingerprints' simulation based on mathematical model of arrangement of dermatoglyphics and creation of minutiae. This paper describes also the design and implementation of an automated fingerprint identification systems which operates in two stages: minutiae extraction and minutiae matching

  6. Hard template synthesis of metal nanowires

    Directory of Open Access Journals (Sweden)

    Go eKawamura

    2014-11-01

    Full Text Available Metal nanowires (NWs have attracted much attention because of their high electron conductivity, optical transmittance and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production of composite devices. The resulting NWs are immobilized and spatially arranged, as dictated by the ordered porous structure of the template. This avoids the NWs from aggregating, which is common for NWs prepared with soft templates in solution. Herein, the hard template synthesis of metal NWs is reviewed, and the resulting structures, properties and potential applications are discussed.

  7. Practical Fingerprinting Localization for Indoor Positioning System by Using Beacons

    Directory of Open Access Journals (Sweden)

    Santosh Subedi

    2017-01-01

    Full Text Available Recent developments in the fields of smartphones and wireless communication technologies such as beacons, Wi-Fi, and ultra-wideband have made it possible to realize indoor positioning system (IPS with a few meters of accuracy. In this paper, an improvement over traditional fingerprinting localization is proposed by combining it with weighted centroid localization (WCL. The proposed localization method reduces the total number of fingerprint reference points over the localization space, thus minimizing both the time required for reading radio frequency signals and the number of reference points needed during the fingerprinting learning process, which eventually makes the process less time-consuming. The proposed positioning has two major steps of operation. In the first step, we have realized fingerprinting that utilizes lightly populated reference points (RPs and WCL individually. Using the location estimated at the first step, WCL is run again for the final location estimation. The proposed localization technique reduces the number of required fingerprint RPs by more than 40% compared to normal fingerprinting localization method with a similar localization estimation error.

  8. Performance characterization of structured light-based fingerprint scanner

    Science.gov (United States)

    Hassebrook, Laurence G.; Wang, Minghao; Daley, Raymond C.

    2013-05-01

    Our group believes that the evolution of fingerprint capture technology is in transition to include 3-D non-contact fingerprint capture. More specifically we believe that systems based on structured light illumination provide the highest level of depth measurement accuracy. However, for these new technologies to be fully accepted by the biometric community, they must be compliant with federal standards of performance. At present these standards do not exist for this new biometric technology. We propose and define a set of test procedures to be used to verify compliance with the Federal Bureau of Investigation's image quality specification for Personal Identity Verification single fingerprint capture devices. The proposed test procedures include: geometric accuracy, lateral resolution based on intensity or depth, gray level uniformity and flattened fingerprint image quality. Several 2-D contact analogies, performance tradeoffs and optimization dilemmas are evaluated and proposed solutions are presented.

  9. On enabling secure applications through off-line biometric identification

    Energy Technology Data Exchange (ETDEWEB)

    Davida, G.I. [Univ. of Wisconsin, Milwaukee, WI (United States); Frankel, Y. [CertCo LLC, New York, NY (United States); Matt, B.J. [Sandia National Labs., Albuquerque, NM (United States)

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user`s biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user`s private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user`s biometrics to facilitate cryptographic mechanisms.

  10. On enabling secure applications through off-line biometric identification

    International Nuclear Information System (INIS)

    Davida, G.I.; Frankel, Y.; Matt, B.J.

    1998-04-01

    In developing secure applications and systems, the designers often must incorporate secure user identification in the design specification. In this paper, the authors study secure off line authenticated user identification schemes based on a biometric system that can measure a user's biometric accurately (up to some Hamming distance). The schemes presented here enhance identification and authorization in secure applications by binding a biometric template with authorization information on a token such as a magnetic strip. Also developed here are schemes specifically designed to minimize the compromise of a user's private biometrics data, encapsulated in the authorization information, without requiring secure hardware tokens. In this paper the authors furthermore study the feasibility of biometrics performing as an enabling technology for secure system and application design. The authors investigate a new technology which allows a user's biometrics to facilitate cryptographic mechanisms

  11. SNM gamma-ray fingerprint monitor functional requirements and design specifications

    International Nuclear Information System (INIS)

    Bieber, A.M. Jr.; Kane, W.R.

    1994-07-01

    A number of DOE facilities need to perform confirmatory inventory measurements on items of special nuclear material (SNM). The DOE Office of Safeguards and Security (OSS) has tasked the Safeguards, Safety and Nonproliferation Division (SSN) of the Department of Advanced Technology at Brookhaven National Laboratory (BNL) to develop a high-resolution gamma-ray-spectroscopy-based instrument for performing confirmatory inventory measurements on such materials, a ''gamma-ray fingerprint monitor'' (GRFM). This document is a conceptual design for the SSN GRFM system. This conceptual design is based on previous experience with measurements of plutonium-bearing materials and comparison of gamma-ray spectrum features, not on actual tests of the procedures or hardware described. As a result, modifications may be necessary when actual prototype hardware and software are tested in realistic circumstances on actual materials of interest

  12. Development of quality control system for fingerprint comparison processes

    Directory of Open Access Journals (Sweden)

    Shiquan Liu

    2017-01-01

    Full Text Available Fingerprint evidence played an important role in investigation, prosecution, and trial process due to the belief of its uniqueness and unchanged characteristics. However, in recent years, the science behind the process of fingerprint comparisons has been questioned. Main research questions have been focusing on the opaqueness within the comparison processes, subjective judgments, lack of universal standards, no error rate expression on final conclusions, and poor scientific fundamental research data. Facing the above-mentioned questions, this paper aims to suggest a quality control system (QCS for fingerprint comparison processes. This QCS is based on the use of software (PiAnoS and its technological features, being able to provide a data management model to increase the transparency and quality of fingerprint comparison processes.

  13. Report: FY 2007 FISMA Report: Status of EPA’s Computer Security Program

    Science.gov (United States)

    Report #2007-S-00003, September 25, 2007. This is the Office of Inspector General’s Fiscal Year 2007 Federal Information Security Management Act Reporting Template, as prescribed by the Office of Management and Budget (OMB).

  14. Semantically transparent fingerprinting for right protection of digital cinema

    Science.gov (United States)

    Wu, Xiaolin

    2003-06-01

    Digital cinema, a new frontier and crown jewel of digital multimedia, has the potential of revolutionizing the science, engineering and business of movie production and distribution. The advantages of digital cinema technology over traditional analog technology are numerous and profound. But without effective and enforceable copyright protection measures, digital cinema can be more susceptible to widespread piracy, which can dampen or even prevent the commercial deployment of digital cinema. In this paper we propose a novel approach of fingerprinting each individual distribution copy of a digital movie for the purpose of tracing pirated copies back to their source. The proposed fingerprinting technique presents a fundamental departure from the traditional digital watermarking/fingerprinting techniques. Its novelty and uniqueness lie in a so-called semantic or subjective transparency property. The fingerprints are created by editing those visual and audio attributes that can be modified with semantic and subjective transparency to the audience. Semantically-transparent fingerprinting or watermarking is the most robust kind among all existing watermarking techniques, because it is content-based not sample-based, and semantically-recoverable not statistically-recoverable.

  15. ULTRAVIOLET RAMAN SPECTRAL SIGNATURE ACQUISITION: UV RAMAN SPECTRAL FINGERPRINTS.

    Energy Technology Data Exchange (ETDEWEB)

    SEDLACEK,III, A.J.FINFROCK,C.

    2002-09-01

    As a member of the science-support part of the ITT-lead LISA development program, BNL is tasked with the acquisition of UV Raman spectral fingerprints and associated scattering cross-sections for those chemicals-of-interest to the program's sponsor. In support of this role, the present report contains the first installment of UV Raman spectral fingerprint data on the initial subset of chemicals. Because of the unique nature associated with the acquisition of spectral fingerprints for use in spectral pattern matching algorithms (i.e., CLS, PLS, ANN) great care has been undertaken to maximize the signal-to-noise and to minimize unnecessary spectral subtractions, in an effort to provide the highest quality spectral fingerprints. This report is divided into 4 sections. The first is an Experimental section that outlines how the Raman spectra are performed. This is then followed by a section on Sample Handling. Following this, the spectral fingerprints are presented in the Results section where the data reduction process is outlined. Finally, a Photographs section is included.

  16. A Karnaugh-Map based fingerprint minutiae extraction method

    Directory of Open Access Journals (Sweden)

    Sunil Kumar Singla

    2010-07-01

    Full Text Available Fingerprint is one of the most promising method among all the biometric techniques and has been used for thepersonal authentication for a long time because of its wide acceptance and reliability. Features (Minutiae are extracted fromthe fingerprint in question and are compared with the features already stored in the database for authentication. Crossingnumber (CN is the most commonly used minutiae extraction method for fingerprints. In this paper, a new Karnaugh-Mapbased fingerprint minutiae extraction method has been proposed and discussed. In the proposed algorithm the 8 neighborsof a pixel in a 33 window are arranged as 8 bits of a byte and corresponding hexadecimal (hex value is calculated. Thesehex values are simplified using standard Karnaugh-Map (K-map technique to obtain the minimized logical expression.Experiments conducted on the FVC2002/Db1_a database reveals that the developed method is better than the crossingnumber (CN method.

  17. Chemical characterization of fingerprints from adults and children

    Energy Technology Data Exchange (ETDEWEB)

    Buchanan, M.V.; Asano, K. [Oak Ridge National Lab., TN (United States); Bohanon, A. [Knoxville Police Dept., TN (United States)

    1996-12-31

    Observation that children`s fingerprints disappear from surfaces more quickly than adults`, initiated a study to characterize the chemical components in fingerprints. Samples were obtained from about 50 individuals ranging in age from 3 to 64 by extracting chemicals from the fingertips using rubbing alcohol. Using combined gas chromatography/mass spectrometry, a wide range of compounds were identified. Samples from children contained higher levels of relatively volatile free fatty acids, while those from adults had higher levels of less volatile long chain esters of fatty acids. These esters are thought to originate from sebaceous glands located on the face and levels of these compounds increase substantially after puberty. Also, other compounds were observed that could be used to develop improved methods for fingerprint detection at a crime scene. Further, observation of specific compounds raises the possibility of being able to identify personal traits (gender, habits, diseases, etc. ) via analysis of components in fingerprints and/or skin.

  18. High Resolution Ultrasonic Method for 3D Fingerprint Representation in Biometrics

    Science.gov (United States)

    Maev, R. Gr.; Bakulin, E. Y.; Maeva, E. Y.; Severin, F. M.

    Biometrics is an important field which studies different possible ways of personal identification. Among a number of existing biometric techniques fingerprint recognition stands alone - because very large database of fingerprints has already been acquired. Also, fingerprints are an important evidence that can be collected at a crime scene. Therefore, of all automated biometric techniques, especially in the field of law enforcement, fingerprint identification seems to be the most promising. Ultrasonic method of fingerprint imaging was originally introduced over a decade as the mapping of the reflection coefficient at the interface between the finger and a covering plate and has shown very good reliability and free from imperfections of previous two methods. This work introduces a newer development of the ultrasonic fingerprint imaging, focusing on the imaging of the internal structures of fingerprints (including sweat pores) with raw acoustic resolution of about 500 dpi (0.05 mm) using a scanning acoustic microscope to obtain images and acoustic data in the form of 3D data array. C-scans from different depths inside the fingerprint area of fingers of several volunteers were obtained and showed good contrast of ridges-and-valleys patterns and practically exact correspondence to the standard ink-and-paper prints of the same areas. Important feature reveled on the acoustic images was the clear appearance of the sweat pores, which could provide additional means of identification.

  19. Defense of fake fingerprint attacks using a swept source laser optical coherence tomography setup

    Science.gov (United States)

    Meissner, Sven; Breithaupt, Ralph; Koch, Edmund

    2013-03-01

    The most established technique for the identification at biometric access control systems is the human fingerprint. While every human fingerprint is unique, fingerprints can be faked very easily by using thin layer fakes. Because commercial fingerprint scanners use only a two-dimensional image acquisition of the finger surface, they can only hardly differentiate between real fingerprints and fingerprint fakes applied on thin layer materials. A Swept Source OCT system with an A-line rate of 20 kHz and a lateral and axial resolution of approximately 13 μm, a centre wavelength of 1320 nm and a band width of 120 nm (FWHM) was used to acquire fingerprints and finger tips with overlying fakes. Three-dimensional volume stacks with dimensions of 4.5 mm x 4 mm x 2 mm were acquired. The layering arrangement of the imaged finger tips and faked finger tips was analyzed and subsequently classified into real and faked fingerprints. Additionally, sweat gland ducts were detected and consulted for the classification. The manual classification between real fingerprints and faked fingerprints results in almost 100 % correctness. The outer as well as the internal fingerprint can be recognized in all real human fingers, whereby this was not possible in the image stacks of the faked fingerprints. Furthermore, in all image stacks of real human fingers the sweat gland ducts were detected. The number of sweat gland ducts differs between the test persons. The typical helix shape of the ducts was observed. In contrast, in images of faked fingerprints we observe abnormal layer arrangements and no sweat gland ducts connecting the papillae of the outer fingerprint and the internal fingerprint. We demonstrated that OCT is a very useful tool to enhance the performance of biometric control systems concerning attacks by thin layer fingerprint fakes.

  20. Non-destructive forensic latent fingerprint acquisition with chromatic white light sensors

    Science.gov (United States)

    Leich, Marcus; Kiltz, Stefan; Dittmann, Jana; Vielhauer, Claus

    2011-02-01

    Non-destructive latent fingerprint acquisition is an emerging field of research, which, unlike traditional methods, makes latent fingerprints available for additional verification or further analysis like tests for substance abuse or age estimation. In this paper a series of tests is performed to investigate the overall suitability of a high resolution off-the-shelf chromatic white light sensor for the contact-less and non-destructive latent fingerprint acquisition. Our paper focuses on scanning previously determined regions with exemplary acquisition parameter settings. 3D height field and reflection data of five different latent fingerprints on six different types of surfaces (HDD platter, brushed metal, painted car body (metallic and non-metallic finish), blued metal, veneered plywood) are experimentally studied. Pre-processing is performed by removing low-frequency gradients. The quality of the results is assessed subjectively; no automated feature extraction is performed. Additionally, the degradation of the fingerprint during the acquisition period is observed. While the quality of the acquired data is highly dependent on surface structure, the sensor is capable of detecting the fingerprint on all sample surfaces. On blued metal the residual material is detected; however, the ridge line structure dissolves within minutes after fingerprint placement.

  1. Human matching performance of genuine crime scene latent fingerprints.

    Science.gov (United States)

    Thompson, Matthew B; Tangen, Jason M; McCarthy, Duncan J

    2014-02-01

    There has been very little research into the nature and development of fingerprint matching expertise. Here we present the results of an experiment testing the claimed matching expertise of fingerprint examiners. Expert (n = 37), intermediate trainee (n = 8), new trainee (n = 9), and novice (n = 37) participants performed a fingerprint discrimination task involving genuine crime scene latent fingerprints, their matches, and highly similar distractors, in a signal detection paradigm. Results show that qualified, court-practicing fingerprint experts were exceedingly accurate compared with novices. Experts showed a conservative response bias, tending to err on the side of caution by making more errors of the sort that could allow a guilty person to escape detection than errors of the sort that could falsely incriminate an innocent person. The superior performance of experts was not simply a function of their ability to match prints, per se, but a result of their ability to identify the highly similar, but nonmatching fingerprints as such. Comparing these results with previous experiments, experts were even more conservative in their decision making when dealing with these genuine crime scene prints than when dealing with simulated crime scene prints, and this conservatism made them relatively less accurate overall. Intermediate trainees-despite their lack of qualification and average 3.5 years experience-performed about as accurately as qualified experts who had an average 17.5 years experience. New trainees-despite their 5-week, full-time training course or their 6 months experience-were not any better than novices at discriminating matching and similar nonmatching prints, they were just more conservative. Further research is required to determine the precise nature of fingerprint matching expertise and the factors that influence performance. The findings of this representative, lab-based experiment may have implications for the way fingerprint examiners testify in

  2. Customized surgical template fabrication under biomechanical consideration by integrating CBCT image, CAD system and finite element analysis.

    Science.gov (United States)

    Yu, Jian-Hong; Wang, Yu-Tzu; Lin, Chun-Li

    2018-01-30

    This study developed a customized surgical template under mechanical consideration for molar intrusion. Two finite element (FE) models were analyzed for the primary stability under 100 gf traction forces with one mini-screw inserted at the buccal side in horizontal and another in palatal side with two optional positions at 60° (P60) or 15° (P15) angles with inclination toward the molar occlusal surface. The surgical template was generated using rapid prototyping (RP) printing for the clinical application based on improved primarily stability model. The surrounding bone strains for models P15 and P60 were far lower than the bone remodeling critical value. Model P60 presented much lower micro-motion in the screw/bone interface and the screw head displacement than those values in model P15. Using FE analysis for biomechanical evaluation and combining with CT image, image superimposed method and CAD technique can fabricate accuracy/security customized surgical template for mini-screws with better primary stability.

  3. Comparing Categorical and Probabilistic Fingerprint Evidence.

    Science.gov (United States)

    Garrett, Brandon; Mitchell, Gregory; Scurich, Nicholas

    2018-04-23

    Fingerprint examiners traditionally express conclusions in categorical terms, opining that impressions do or do not originate from the same source. Recently, probabilistic conclusions have been proposed, with examiners estimating the probability of a match between recovered and known prints. This study presented a nationally representative sample of jury-eligible adults with a hypothetical robbery case in which an examiner opined on the likelihood that a defendant's fingerprints matched latent fingerprints in categorical or probabilistic terms. We studied model language developed by the U.S. Defense Forensic Science Center to summarize results of statistical analysis of the similarity between prints. Participant ratings of the likelihood the defendant left prints at the crime scene and committed the crime were similar when exposed to categorical and strong probabilistic match evidence. Participants reduced these likelihoods when exposed to the weaker probabilistic evidence, but did not otherwise discriminate among the prints assigned different match probabilities. © 2018 American Academy of Forensic Sciences.

  4. Optical Methods in Fingerprint Imaging for Medical and Personality Applications.

    Science.gov (United States)

    Wang, Chia-Nan; Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-10-23

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the "Big Five" personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  5. Enhancement of plant metabolite fingerprinting by machine learning.

    Science.gov (United States)

    Scott, Ian M; Vermeer, Cornelia P; Liakata, Maria; Corol, Delia I; Ward, Jane L; Lin, Wanchang; Johnson, Helen E; Whitehead, Lynne; Kular, Baldeep; Baker, John M; Walsh, Sean; Dave, Anuja; Larson, Tony R; Graham, Ian A; Wang, Trevor L; King, Ross D; Draper, John; Beale, Michael H

    2010-08-01

    Metabolite fingerprinting of Arabidopsis (Arabidopsis thaliana) mutants with known or predicted metabolic lesions was performed by (1)H-nuclear magnetic resonance, Fourier transform infrared, and flow injection electrospray-mass spectrometry. Fingerprinting enabled processing of five times more plants than conventional chromatographic profiling and was competitive for discriminating mutants, other than those affected in only low-abundance metabolites. Despite their rapidity and complexity, fingerprints yielded metabolomic insights (e.g. that effects of single lesions were usually not confined to individual pathways). Among fingerprint techniques, (1)H-nuclear magnetic resonance discriminated the most mutant phenotypes from the wild type and Fourier transform infrared discriminated the fewest. To maximize information from fingerprints, data analysis was crucial. One-third of distinctive phenotypes might have been overlooked had data models been confined to principal component analysis score plots. Among several methods tested, machine learning (ML) algorithms, namely support vector machine or random forest (RF) classifiers, were unsurpassed for phenotype discrimination. Support vector machines were often the best performing classifiers, but RFs yielded some particularly informative measures. First, RFs estimated margins between mutant phenotypes, whose relations could then be visualized by Sammon mapping or hierarchical clustering. Second, RFs provided importance scores for the features within fingerprints that discriminated mutants. These scores correlated with analysis of variance F values (as did Kruskal-Wallis tests, true- and false-positive measures, mutual information, and the Relief feature selection algorithm). ML classifiers, as models trained on one data set to predict another, were ideal for focused metabolomic queries, such as the distinctiveness and consistency of mutant phenotypes. Accessible software for use of ML in plant physiology is highlighted.

  6. Multiple chromatographic fingerprinting and its application to the quality control of herbal medicines

    International Nuclear Information System (INIS)

    Fan Xiaohui; Cheng Yiyu; Ye Zhengliang; Lin Ruichao; Qian Zhongzhi

    2006-01-01

    Recently, chromatographic fingerprinting has become one of the most powerful approaches to quality control of herbal medicines. However, the performance of reported chromatographic fingerprinting constructed by single chromatogram sometimes turns out to be inadequate for complex herbal medicines, such as multi-herb botanical drug products. In this study, multiple chromatographic fingerprinting, which consists of more than one chromatographic fingerprint and represents the whole characteristics of chemical constitutions of the complex medicine, is proposed as a potential strategy in this complicated case. As a typical example, a binary chromatographic fingerprinting of 'Danshen Dropping Pill' (DSDP), the best-sold traditional Chinese medicine in China, was developed. First, two HPLC fingerprints that, respectively, represent chemical characteristics of depsides and saponins of DSDP were developed, which were used to construct binary chromatographic fingerprints of DSDP. Moreover, the authentication and validation of the binary fingerprints were performed. Then, a data-level information fusion method was employed to capture the chemical information encoded in two chromatographic fingerprints. Based on the fusion results, the lot-to-lot consistency and frauds can be determined either using similarity measure or by chemometrics approach. The application of binary chromatographic fingerprinting to consistency assessment and frauds detection of DSDP clearly demonstrated that the proposed method was a powerful approach to quality control of complex herbal medicines

  7. Diversity of DNA fingerprints of Mycobacterium tuberculosis isolates in the United States.

    Science.gov (United States)

    Yang, Z; Barnes, P F; Chaves, F; Eisenach, K D; Weis, S E; Bates, J H; Cave, M D

    1998-04-01

    To investigate the diversity of IS6110 fingerprints of Mycobacterium tuberculosis isolates in the United States and to determine if matching IS6110 fingerprints represent recent interstate tuberculosis transmission, we performed restriction fragment length polymorphism analysis of M. tuberculosis isolates from 1,326 patients in three geographically separated states. Seven hundred ninety-five different IS6110 fingerprint patterns were generated, and pattern diversity was similar in each state. Ninety-six percent of the fingerprint patterns were observed in only one state, demonstrating that most IS6110 fingerprint patterns are confined to a single geographic location. Of the IS6110 fingerprint patterns that were shared by isolates from more than one state, most isolates with 1 to 5 IS6110 copies were separable by pTBN12 fingerprinting whereas those with > 15 copies were not. One high-copy-number M. tuberculosis strain had identical IS6110 and pTBN12 fingerprints and included 57 isolates from three states. Epidemiological data demonstrated significant recent transmission of tuberculosis within each city but not among the states. This suggests that identical fingerprints of isolates from geographically separate locations most likely reflect interstate tuberculosis transmission in the past, with subsequent intrastate spread of disease. Further evaluation of M. tuberculosis strains that cause outbreaks in different geographic locations will provide insight into the epidemiological and bacteriological factors that facilitate the spread of tuberculosis.

  8. Supersensitive fingerprinting of explosives by chemically modified nanosensors arrays

    Science.gov (United States)

    Lichtenstein, Amir; Havivi, Ehud; Shacham, Ronen; Hahamy, Ehud; Leibovich, Ronit; Pevzner, Alexander; Krivitsky, Vadim; Davivi, Guy; Presman, Igor; Elnathan, Roey; Engel, Yoni; Flaxer, Eli; Patolsky, Fernando

    2014-06-01

    The capability to detect traces of explosives sensitively, selectively and rapidly could be of great benefit for applications relating to civilian national security and military needs. Here, we show that, when chemically modified in a multiplexed mode, nanoelectrical devices arrays enable the supersensitive discriminative detection of explosive species. The fingerprinting of explosives is achieved by pattern recognizing the inherent kinetics, and thermodynamics, of interaction between the chemically modified nanosensors array and the molecular analytes under test. This platform allows for the rapid detection of explosives, from air collected samples, down to the parts-per-quadrillion concentration range, and represents the first nanotechnology-inspired demonstration on the selective supersensitive detection of explosives, including the nitro- and peroxide-derivatives, on a single electronic platform. Furthermore, the ultrahigh sensitivity displayed by our platform may allow the remote detection of various explosives, a task unachieved by existing detection technologies.

  9. Fast Fingerprint Database Maintenance for Indoor Positioning Based on UGV SLAM

    Directory of Open Access Journals (Sweden)

    Jian Tang

    2015-03-01

    Full Text Available Indoor positioning technology has become more and more important in the last two decades. Utilizing Received Signal Strength Indicator (RSSI fingerprints of Signals of OPportunity (SOP is a promising alternative navigation solution. However, as the RSSIs vary during operation due to their physical nature and are easily affected by the environmental change, one challenge of the indoor fingerprinting method is maintaining the RSSI fingerprint database in a timely and effective manner. In this paper, a solution for rapidly updating the fingerprint database is presented, based on a self-developed Unmanned Ground Vehicles (UGV platform NAVIS. Several SOP sensors were installed on NAVIS for collecting indoor fingerprint information, including a digital compass collecting magnetic field intensity, a light sensor collecting light intensity, and a smartphone which collects the access point number and RSSIs of the pre-installed WiFi network. The NAVIS platform generates a map of the indoor environment and collects the SOPs during processing of the mapping, and then the SOP fingerprint database is interpolated and updated in real time. Field tests were carried out to evaluate the effectiveness and efficiency of the proposed method. The results showed that the fingerprint databases can be quickly created and updated with a higher sampling frequency (5Hz and denser reference points compared with traditional methods, and the indoor map can be generated without prior information. Moreover, environmental changes could also be detected quickly for fingerprint indoor positioning.

  10. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Directory of Open Access Journals (Sweden)

    Chia-Nan Wang

    2017-10-01

    Full Text Available Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs.

  11. [HPLC characteristic fingerprints of sedi linearis herba and sedi herba].

    Science.gov (United States)

    Lu, Lan-Qing; Mei, Qing; Wan, Ding-Rong; Yang, Xin-Zhou; Qiao, Shu; Zhao, Yu-Dan

    2014-04-01

    To study HPLC characteristic fingerprint of Sedum lineare from different harvest periods, and to compare with its related species Sedum sarmentosum. The HPLC fingerprints of Sedum lineare from different collecting periods were established and compared with Sedum sarmentosum by the same detection method. Hyperin, isoquercitrin and astragaloside were identified from the HPLC fingerprint of Sedum lineare. The fingerprint of Sedum lineare growing in the same area but different environment were basically identical; while there were remarkable differences of Sedum lineare growing in the same place but from different harvest periods, with the area of most common peaks changing from little to great, and slightly different peak number. The HPLC fingerprint of the two Sedum species had four common peaks, but could be distinguished from each other. The optimal harvest period of these two species should be full-bloom stage. The established method can provide reference for identification and quality analysis of Sedum lineare.

  12. Identification and Quality Assessment of Chrysanthemum Buds by CE Fingerprinting

    Directory of Open Access Journals (Sweden)

    Xiaoping Xing

    2015-01-01

    Full Text Available A simple and efficient fingerprinting method for chrysanthemum buds was developed with the aim of establishing a quality control protocol based on biochemical makeup. Chrysanthemum bud samples were successively extracted by water and alcohol. The fingerprints of the chrysanthemum buds samples were obtained using capillary electrophoresis and electrochemical detection (CE-ED employing copper and carbon working electrodes to capture all of the chemical information. 10 batches of chrysanthemum buds were collected from different regions and various factories to establish the baseline fingerprint. The experimental data of 10 batches electropherogram buds by CE were analyzed by correlation coefficient and the included angle cosine methods. A standard chrysanthemum bud fingerprint including 24 common peaks was established, 12 from each electrode, which was successfully applied to identify and distinguish between chrysanthemum buds from 2 other chrysanthemum species. These results demonstrate that fingerprint analysis can be used as an important criterion for chrysanthemum buds quality control.

  13. Optical Methods in Fingerprint Imaging for Medical and Personality Applications

    Science.gov (United States)

    Wang, Jing-Wein; Lin, Ming-Hsun; Chang, Yao-Lang; Kuo, Chia-Ming

    2017-01-01

    Over the years, analysis and induction of personality traits has been a topic for individual subjective conjecture or speculation, rather than a focus of inductive scientific analysis. This study proposes a novel framework for analysis and induction of personality traits. First, 14 personality constructs based on the “Big Five” personality factors were developed. Next, a new fingerprint image algorithm was used for classification, and the fingerprints were classified into eight types. The relationship between personality traits and fingerprint type was derived from the results of the questionnaire survey. After comparison of pre-test and post-test results, this study determined the induction ability of personality traits from fingerprint type. Experimental results showed that the left/right thumbprint type of a majority of subjects was left loop/right loop and that the personalities of individuals with this fingerprint type were moderate with no significant differences in the 14 personality constructs. PMID:29065556

  14. A tree based method for the rapid screening of chemical fingerprints

    DEFF Research Database (Denmark)

    Kristensen, Thomas Greve; Nielsen, Jesper; Pedersen, Christian Nørgaard Storm

    2009-01-01

    The fingerprint of a molecule is a bitstring based on its structure, constructed such that structurally similar molecules will have similar fingerprints. Molecular fingerprints can be used in an initial phase for identifying novel drug candidates by screening large databases for molecules......: the kD grid and the Multibit tree. The kD grid is based on splitting the fingerprints into k shorter bitstrings and utilising these to compute bounds on the similarity of the complete bitstrings. The Multibit tree uses hierarchical clustering and similarity within each cluster to compute similar bounds...

  15. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.; Schönlieb, C.-B.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  16. Oriented diffusion filtering for enhancing low-quality fingerprint images

    KAUST Repository

    Gottschlich, C.

    2012-01-01

    To enhance low-quality fingerprint images, we present a novel method that first estimates the local orientation of the fingerprint ridge and valley flow and next performs oriented diffusion filtering, followed by a locally adaptive contrast enhancement step. By applying the authors\\' new approach to low-quality images of the FVC2004 fingerprint databases, the authors are able to show its competitiveness with other state-of-the-art enhancement methods for fingerprints like curved Gabor filtering. A major advantage of oriented diffusion filtering over those is its computational efficiency. Combining oriented diffusion filtering with curved Gabor filters led to additional improvements and, to the best of the authors\\' knowledge, the lowest equal error rates achieved so far using MINDTCT and BOZORTH3 on the FVC2004 databases. The recognition performance and the computational efficiency of the method suggest to include oriented diffusion filtering as a standard image enhancement add-on module for real-time fingerprint recognition systems. In order to facilitate the reproduction of these results, an implementation of the oriented diffusion filtering for Matlab and GNU Octave is made available for download. © 2012 The Institution of Engineering and Technology.

  17. Aspects of physicochemical methods for the detection of latent fingerprints

    International Nuclear Information System (INIS)

    Knowles, A.M.

    1978-01-01

    This paper reviews physicochemical methods of detecting latent finger-prints on a wide range of materials commonly found at the scene of a crime, with particular emphasis placed on the newer autoradiographic techniques. This is set against a description of studies on the fundamental nature of the latent fingerprint and its host substrate, with a brief review of the history of reagents used in latent fingerprint examination. (author)

  18. Multiple chromatographic fingerprinting and its application to the quality control of herbal medicines

    Energy Technology Data Exchange (ETDEWEB)

    Fan Xiaohui [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China); Cheng Yiyu [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China)]. E-mail: chengyy@zju.edu.cn; Ye Zhengliang [Pharmaceutical Informatics Institute, College of Pharmaceutical Sciences, Zhejiang University, Hangzhou 310027 (China); Lin Ruichao [National Institute for the Control of Pharmaceutical and Biological Products, Beijing 100050 (China); Qian Zhongzhi [Committee of Chinese Pharmacopoeia, Beijing 100061 (China)

    2006-01-12

    Recently, chromatographic fingerprinting has become one of the most powerful approaches to quality control of herbal medicines. However, the performance of reported chromatographic fingerprinting constructed by single chromatogram sometimes turns out to be inadequate for complex herbal medicines, such as multi-herb botanical drug products. In this study, multiple chromatographic fingerprinting, which consists of more than one chromatographic fingerprint and represents the whole characteristics of chemical constitutions of the complex medicine, is proposed as a potential strategy in this complicated case. As a typical example, a binary chromatographic fingerprinting of 'Danshen Dropping Pill' (DSDP), the best-sold traditional Chinese medicine in China, was developed. First, two HPLC fingerprints that, respectively, represent chemical characteristics of depsides and saponins of DSDP were developed, which were used to construct binary chromatographic fingerprints of DSDP. Moreover, the authentication and validation of the binary fingerprints were performed. Then, a data-level information fusion method was employed to capture the chemical information encoded in two chromatographic fingerprints. Based on the fusion results, the lot-to-lot consistency and frauds can be determined either using similarity measure or by chemometrics approach. The application of binary chromatographic fingerprinting to consistency assessment and frauds detection of DSDP clearly demonstrated that the proposed method was a powerful approach to quality control of complex herbal medicines.

  19. Templated Dry Printing of Conductive Metal Nanoparticles

    Science.gov (United States)

    Rolfe, David Alexander

    Printed electronics can lower the cost and increase the ubiquity of electrical components such as batteries, sensors, and telemetry systems. Unfortunately, the advance of printed electronics has been held back by the limited minimum resolution, aspect ratio, and feature fidelity of present printing techniques such as gravure, screen printing and inkjet printing. Templated dry printing offers a solution to these problems by patterning nanoparticle inks into templates before drying. This dissertation shows advancements in two varieties of templated dry nanoprinting. The first, advective micromolding in vapor-permeable templates (AMPT) is a microfluidic approach that uses evaporation-driven mold filling to create submicron features with a 1:1 aspect ratio. We will discuss submicron surface acoustic wave (SAW) resonators made through this process, and the refinement process in the template manufacturing process necessary to make these devices. We also present modeling techniques that can be applied to future AMPT templates. We conclude with a modified templated dry printing that improves throughput and isolated feature patterning by transferring dry-templated features with laser ablation. This method utilizes surface energy-defined templates to pattern features via doctor blade coating. Patterned and dried features can be transferred to a polymer substrate with an Nd:YAG MOPA fiber laser, and printed features can be smaller than the laser beam width.

  20. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem

    Directory of Open Access Journals (Sweden)

    Helala AlShehri

    2018-03-01

    Full Text Available The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  1. A Large-Scale Study of Fingerprint Matching Systems for Sensor Interoperability Problem.

    Science.gov (United States)

    AlShehri, Helala; Hussain, Muhammad; AboAlSamh, Hatim; AlZuair, Mansour

    2018-03-28

    The fingerprint is a commonly used biometric modality that is widely employed for authentication by law enforcement agencies and commercial applications. The designs of existing fingerprint matching methods are based on the hypothesis that the same sensor is used to capture fingerprints during enrollment and verification. Advances in fingerprint sensor technology have raised the question about the usability of current methods when different sensors are employed for enrollment and verification; this is a fingerprint sensor interoperability problem. To provide insight into this problem and assess the status of state-of-the-art matching methods to tackle this problem, we first analyze the characteristics of fingerprints captured with different sensors, which makes cross-sensor matching a challenging problem. We demonstrate the importance of fingerprint enhancement methods for cross-sensor matching. Finally, we conduct a comparative study of state-of-the-art fingerprint recognition methods and provide insight into their abilities to address this problem. We performed experiments using a public database (FingerPass) that contains nine datasets captured with different sensors. We analyzed the effects of different sensors and found that cross-sensor matching performance deteriorates when different sensors are used for enrollment and verification. In view of our analysis, we propose future research directions for this problem.

  2. Analysis of cellular and extracellular DNA in fingerprints

    Energy Technology Data Exchange (ETDEWEB)

    Button, Julie M. [Lawrence Livermore National Lab. (LLNL), Livermore, CA (United States)

    2014-09-09

    It has been previously shown that DNA can be recovered from latent fingerprints left on various surfaces [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. However, the source of the DNA, extracellular versus cellular origin, is difficult to determine. If the DNA is cellular, it is believed to belong to skin cells while extracellular DNA is believed to originate from body fluids such as sweat [D. J. Daly et. al, Forensic Sci. Int. Genet. 6, 41-46 (2012); V. V. Vlassov et. al, BioEssays 29, 654-667 (2007)]. The origin of the DNA in fingerprints has implications for processing and interpretation of forensic evidence. The determination of the origin of DNA in fingerprints is further complicated by the fact that the DNA in fingerprints tends to be at a very low quantity [R. A. H. van Oorschot and M. K. Jones, Nature 387, 767 (1997)]. This study examined fingerprints from five volunteers left on sterilized glass slides and plastic pens. Three fingerprints were left on each glass slide (thumb, index, and middle fingers) while the pens were held as if one was writing with them. The DNA was collected from the objects using the wet swabbing technique (TE buffer). Following collection, the cellular and extracellular components of each sample were separated using centrifugation and an acoustofluidics system. Centrifugation is still the primary separation technique utilized in forensics laboratories, while acoustic focusing uses sound waves to focus large particles (cells) into low pressure nodes, separating them from the rest of the sample matrix. After separation, all samples were quantified using real-time quantitative PCR (qPCR). The overall trend is that there is more DNA in the extracellular fractions than cellular fractions for both centrifugation and acoustofluidic processing. Additionally, more DNA was generally collected from the pen samples than the samples left on glass slides.

  3. Fast probabilistic file fingerprinting for big data.

    Science.gov (United States)

    Tretyakov, Konstantin; Laur, Sven; Smant, Geert; Vilo, Jaak; Prins, Pjotr

    2013-01-01

    Biological data acquisition is raising new challenges, both in data analysis and handling. Not only is it proving hard to analyze the data at the rate it is generated today, but simply reading and transferring data files can be prohibitively slow due to their size. This primarily concerns logistics within and between data centers, but is also important for workstation users in the analysis phase. Common usage patterns, such as comparing and transferring files, are proving computationally expensive and are tying down shared resources. We present an efficient method for calculating file uniqueness for large scientific data files, that takes less computational effort than existing techniques. This method, called Probabilistic Fast File Fingerprinting (PFFF), exploits the variation present in biological data and computes file fingerprints by sampling randomly from the file instead of reading it in full. Consequently, it has a flat performance characteristic, correlated with data variation rather than file size. We demonstrate that probabilistic fingerprinting can be as reliable as existing hashing techniques, with provably negligible risk of collisions. We measure the performance of the algorithm on a number of data storage and access technologies, identifying its strengths as well as limitations. Probabilistic fingerprinting may significantly reduce the use of computational resources when comparing very large files. Utilisation of probabilistic fingerprinting techniques can increase the speed of common file-related workflows, both in the data center and for workbench analysis. The implementation of the algorithm is available as an open-source tool named pfff, as a command-line tool as well as a C library. The tool can be downloaded from http://biit.cs.ut.ee/pfff.

  4. [HPTLC fingerprint analysis of andrographolides from Andrographis paniculata].

    Science.gov (United States)

    Shao, Yan-Hua; Wang, Jian-Gang; Lai, Xiao-Ping; Wu, Xiang-Wei; Ding, Ping

    2014-02-01

    To establish the high-performance thin layer chromatography (HPTLC) fingerprint of andrographolides from Andrographis paniculata, and to valuate the fingerprint similarity of samples from different habitats, markets, used parts and so on. Chromatographic conditions were as follows: stationary phase: precoated HPTLC GF254 silica-gel plate (20 cm x 10 cm); developing solvent system: chloroform-toluene-methanol (80:10:15); Relative humidity: 42%; Color development reagent: 5% H2SO4 ethanolic solution, heating at 105 degrees C and observing the fluorescent chromatogram in a UV cabinet at 366 nm. The common patterns of HPTLC fingerprint were obtained through CHROMAP 1.5 solution software. The HPTLC fingerprint of andrographolides was consisted of 9 characteristic peaks (fluorescent bands) including andrographolide, neoandrographolide and dehydroandrographolide which were chemical reference substances. The investigation and analysis of 51 batches of Andrographis paniculata showed that there were remarkable differences among different samples, so was the content of andrographolide and total lactones. This method is simple and rapid, which can serve as an effective identification and quality assessment method for Andrographis paniculata.

  5. Partial Fingerprint Image Enhancement using Region Division Technique and Morphological Transform

    International Nuclear Information System (INIS)

    Ahmad, A.; Arshad, I.; Raja, G.

    2015-01-01

    Fingerprints are the most renowned biometric trait for identification and verification. The quality of fingerprint image plays a vital role in feature extraction and matching. Existing algorithms work well for good quality fingerprint images and fail for partial fingerprint images as they are obtained from excessively dry fingers or affected by disease resulting in broken ridges. We propose an algorithm to enhance partial fingerprint images using morphological operatins with region division technique. The proposed method divides low quality image into six regions from top to bottom. Morphological operations choose an appropriate Structuring Element (SE) that joins broken ridges and thus enhance the image for further processing. The proposed method uses SE line with suitable angle theta and radius r in each region based on the orientation of the ridges. The algorithm is applied to 14 low quality fingerprint images from FVC-2002 database. Experimental results show that percentage accuracy has been improved using the proposed algorithm. The manual markup has been reduced and accuracy of 76.16% with Equal Error Rate (EER) of 3.16% is achieved. (author)

  6. Development of Total Knee Replacement Digital Templating Software

    Science.gov (United States)

    Yusof, Siti Fairuz; Sulaiman, Riza; Thian Seng, Lee; Mohd. Kassim, Abdul Yazid; Abdullah, Suhail; Yusof, Shahril; Omar, Masbah; Abdul Hamid, Hamzaini

    In this study, by taking full advantage of digital X-ray and computer technology, we have developed a semi-automated procedure to template knee implants, by making use of digital templating method. Using this approach, a software system called OrthoKneeTMhas been designed and developed. The system is to be utilities as a study in the Department of Orthopaedic and Traumatology in medical faculty, UKM (FPUKM). OrthoKneeTMtemplating process employs uses a technique similar to those used by many surgeons, using acetate templates over X-ray films. Using template technique makes it easy to template various implant from every Implant manufacturers who have with a comprehensive database of templates. The templating functionality includes, template (knee) and manufactures templates (Smith & Nephew; and Zimmer). From an image of patient x-ray OrthoKneeTMtemplates help in quickly and easily reads to the approximate template size needed. The visual templating features then allow us quickly review multiple template sizes against the X-ray and thus obtain the nearly precise view of the implant size required. The system can assist by templating on one patient image and will generate reports that can accompany patient notes. The software system was implemented in Visual basic 6.0 Pro using the object-oriented techniques to manage the graphics and objects. The approaches for image scaling will be discussed. Several of measurement in orthopedic diagnosis process have been studied and added in this software as measurement tools features using mathematic theorem and equations. The study compared the results of the semi-automated (using digital templating) method to the conventional method to demonstrate the accuracy of the system.

  7. Template Assembly for Detailed Urban Reconstruction

    KAUST Repository

    Nan, Liangliang

    2015-05-04

    We propose a new framework to reconstruct building details by automatically assembling 3D templates on coarse textured building models. In a preprocessing step, we generate an initial coarse model to approximate a point cloud computed using Structure from Motion and Multi View Stereo, and we model a set of 3D templates of facade details. Next, we optimize the initial coarse model to enforce consistency between geometry and appearance (texture images). Then, building details are reconstructed by assembling templates on the textured faces of the coarse model. The 3D templates are automatically chosen and located by our optimization-based template assembly algorithm that balances image matching and structural regularity. In the results, we demonstrate how our framework can enrich the details of coarse models using various data sets.

  8. Novel fingerprint re-alignment solution that uses the TFCP as a reference

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-08-01

    Full Text Available , independent, and efficient for all types of fingerprints. It, in particular, is useful when dealing with the type of fingerprints that belong to the Plain Arch (PA) fingerprint class. The credibility of this proposed solution is interrogated through its...

  9. 2D vector-cyclic deformable templates

    DEFF Research Database (Denmark)

    Schultz, Nette; Conradsen, Knut

    1998-01-01

    In this paper the theory of deformable templates is a vector cycle in 2D is described. The deformable template model originated in (Grenander, 1983) and was further investigated in (Grenander et al., 1991). A template vector distribution is induced by parameter distribution from transformation...... matrices applied to the vector cycle. An approximation in the parameter distribution is introduced. The main advantage by using the deformable template model is the ability to simulate a wide range of objects trained by e.g. their biological variations, and thereby improve restoration, segmentation...... and probabillity measurement. The case study concerns estimation of meat percent in pork carcasses. Given two cross-sectional images - one at the front and one near the ham of the carcass - the areas of lean and fat and a muscle in the lean area are measured automatically by the deformable templates....

  10. Ridge Width Correlations between Inked Prints and Powdered Latent Fingerprints.

    Science.gov (United States)

    De Alcaraz-Fossoul, Josep; Barrot-Feixat, Carme; Zapico, Sara C; Mancenido, Michelle; Broatch, Jennifer; Roberts, Katherine A; Carreras-Marin, Clara; Tasker, Jack

    2017-10-03

    A methodology to estimate the time of latent fingerprint deposition would be of great value to law enforcement and courts. It has been observed that ridge topography changes as latent prints age, including the widths of ridges that could be measured as a function of time. Crime suspects are commonly identified using fingerprint databases that contain reference inked tenprints (flat and rolled impressions). These can be of interest in aging studies as they provide baseline information relating to the original (nonaged) ridges' widths. In practice, the age of latent fingerprints could be estimated following a comparison process between the evidentiary aged print and the corresponding reference inked print. The present article explores possible correlations between inked and fresh latent fingerprints deposited on different substrates and visualized with TiO 2 . The results indicate that the ridge width of flat inked prints is most similar to fresh latent fingerprints , and these should be used as the comparison standard for future aging studies. © 2017 American Academy of Forensic Sciences.

  11. Investigation of genomic instability by assay of DNA fingerprint from the offspring of male mice exposed to chronic low-level γ-radiation

    International Nuclear Information System (INIS)

    Bezlepkin, V.G.; Vasil'eva, G.V.; Lomaeva, M.G.; Sirota, N.P.; Gaziev, A.I.

    2000-01-01

    By polymerase chain reaction with arbitrary primer (AP-PCR), the possibility of transmission of genome instability to somatic cells of the offspring (F 1 generation) from male parents of mice exposed to chronic low-dose γ-radiation was studied. Male mice 15 days after exposure to 10-50 cGy were mated with unirradiated females. Biopsies were taken from tale tips of two month-old mice progeny for DNA separation. Primer in the AP-PCR was 20-mer oligonucleotide flanking the micro-satellite locus Atplb2 on chromosome 11 of the mouse. Comparative analysis of individual fingerprints of AP-PCR products on DNA-templates from the offspring of irradiated and unirradiated male mice revealed an increased variability of micro-satellite-associated sequences in the genome of the offspring of males exposed to 25 and 50 cGy. DNA-fingerprints of the offspring of male mice exposed to chronic irradiation doses 10 and 25 cGy. 15 days before fertilization (at the post-meiotic stage of spermatogenesis) showed an increased frequency of non-parent bands. Result of the study point to the possibility of transmission to the offspring somatic cells of changes increasing genome instability from male parents exposed to chronic low-dose radiation prior to fertilization [ru

  12. Accuracy of templating the acetabular cup size in Total Hip Replacement using conventional acetate templates on digital radiographs.

    Science.gov (United States)

    Krishnamoorthy, Vignesh P; Perumal, Rajamani; Daniel, Alfred J; Poonnoose, Pradeep M

    2015-12-01

    Templating of the acetabular cup size in Total Hip Replacement (THR) is normally done using conventional radiographs. As these are being replaced by digital radiographs, it has become essential to create a technique of templating using digital films. We describe a technique that involves templating the digital films using the universally available acetate templates for THR without the use of special software. Preoperative digital radiographs of the pelvis were taken with a 30 mm diameter spherical metal ball strapped over the greater trochanter. Using standard acetate templates provided by the implant company on magnified digital radiographs, the size of the metal ball (X mm) and acetabular cup (Y mm) were determined. The size of the acetabular cup to be implanted was estimated using the formula 30*Y/X. The estimated size was compared with the actual size of the cup used at surgery. Using this technique, it was possible to accurately predict the acetabular cup size in 28/40 (70%) of the hips. When the accuracy to within one size was considered, templating was correct in 90% (36/40). When assessed by two independent observers, there was good intra-observer and inter-observer reliability with intra-class correlation coefficient values greater than 0.8. It was possible to accurately and reliably predict the size of the acetabular cup, using acetate templates on digital films, without any digital templates.

  13. 75 FR 5614 - Privacy Act of 1974; Department of Homeland Security/ALL-025 Law Enforcement Authority in Support...

    Science.gov (United States)

    2010-02-03

    ...'s or entity's name; Digital photograph; Date of birth, place of birth, and age; Social security number; Duty/work address and telephone number; Alias; Race and ethnicity; Citizenship; Fingerprints; Sex... servers, magnetic disc, tape, digital media, and CD-ROM. RETRIEVABILITY: Records may be retrieved by...

  14. Multifragment alleles in DNA fingerprints of the parrot, Amazona ventralis

    Science.gov (United States)

    Brock, M.K.; White, B.N.

    1991-01-01

    Human DNA probes that identify variable numbers of tandem repeat loci are being used to generate DNA fingerprints in many animal and plant species. In most species the majority of the sc rable autoradiographic bands of the DNA fingerprint represent alleles from numerous unlinked loci. This study was initiated to use DNA fingerprints to determine the amount of band-sharing among captive Hispaniolan parrots (Amazona ventralis) with known genetic relationships. This would form the data base to examine DNA fingerprints of the closely related and endangered Puerto Rican parrot (A. vittata) and to estimate the degree of inbreeding in the relic population. We found by segregation analysis of the bands scored in the DNA fingerprints of the Hispaniolan parrots that there may be as few as two to five loci identified by the human 33.15 probe. Furthermore, at one locus we identified seven alleles, one of which is represented by as many as 19 cosegregating bands. It is unknown how common multiband alleles might be in natural populations, and their existence will cause problems in the assessment of relatedness by band-sharing analysis. We believe, therefore, that a pedigree analysis should be included in all DNA fingerprinting studies, where possible, in order to estimate the number of loci identified by a minisatellite DNA probe and to examine the nature of their alleles.

  15. Comparison of Powder Dusting and Cyanoacrylate Fuming Techniques in Retrieving Latent Fingerprint Exposed to Environment Conditions

    International Nuclear Information System (INIS)

    Mayalvanan, Y.; Sri Pawita Albakri Amir Hamzah; Chuan, L.L.; Muhamad Hilmi Baba; Amidon Anan

    2014-01-01

    Latent fingerprints are one of the best evidence to prove the presence of an individuals presence at the crime scene. There are many techniques available for a successful fingerprint lifting. Two of the most common ones are fingerprint powder dusting and cyanoacrylate fuming. This research aims to compare both techniques and determine which has a higher success rate in retrieving fingerprints exposed to local environmental conditions for three days. Fingerprint samples were collected from 18 subjects on glass, perspex and aluminium slides. These samples were then exposed to local environmental conditions for three days. The fingerprints were then developed using the aforementioned techniques. Based on the results, it can be safely said that, fuming results in clearer fingerprints and more minutiae can be found from the retrieved fingerprints even with exposure to less than optimum local conditions. This proves that fuming is a better fingerprint lifting method to resolve latent fingerprint compared to powder dusting. Surface on which the fingerprint is retrieved from influences the quality of clarity of a latent fingerprint. (author)

  16. Quality improvement of fingerprints of decayed corpses by local thanatopractical processing (Thanatoprint

    Directory of Open Access Journals (Sweden)

    Gahr, Britta

    2013-11-01

    Full Text Available Thanatopractical processing allows morphological reconstruction of even advanced decayed bodies. By extracting fluids from the body’s tissue antemortem tenseness and volume can be restored. If bodies are partly subject to thanatopractical processing in the hand region (“Thanatoprint”, fingerprints of high quality can be gathered even in cases of advanced decay. Without this treatment fingerprinting can be extremely difficult, if not impossible. Thanatopractical processing could be applied successfully in cases of partial to subtotal detachment of the epidermis as well. In an interdisciplinary study 400 fingerprints of bodies in various states of decay were examined after application of Thanatoprint. In 76.75% fingerprints were applicable for data entry into AFIS (Automated Fingerprint Identification System; another 11.00% of the fingerprints could be used for the process of non-elimination. Further advantages of the method are low invasivity while maintaining the integrity of the corpse, less time- and material requirement as well as its long-lasting effect.

  17. Distortion Estimation in Compressed Music Using Only Audio Fingerprints

    NARCIS (Netherlands)

    Doets, P.J.O.; Lagendijk, R.L.

    2008-01-01

    An audio fingerprint is a compact yet very robust representation of the perceptually relevant parts of an audio signal. It can be used for content-based audio identification, even when the audio is severely distorted. Audio compression changes the fingerprint slightly. We show that these small

  18. A preliminary study of DTI Fingerprinting on stroke analysis.

    Science.gov (United States)

    Ma, Heather T; Ye, Chenfei; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo

    2014-01-01

    DTI (Diffusion Tensor Imaging) is a well-known MRI (Magnetic Resonance Imaging) technique which provides useful structural information about human brain. However, the quantitative measurement to physiological variation of subtypes of ischemic stroke is not available. An automatically quantitative method for DTI analysis will enhance the DTI application in clinics. In this study, we proposed a DTI Fingerprinting technology to quantitatively analyze white matter tissue, which was applied in stroke classification. The TBSS (Tract Based Spatial Statistics) method was employed to generate mask automatically. To evaluate the clustering performance of the automatic method, lesion ROI (Region of Interest) is manually drawn on the DWI images as a reference. The results from the DTI Fingerprinting were compared with those obtained from the reference ROIs. It indicates that the DTI Fingerprinting could identify different states of ischemic stroke and has promising potential to provide a more comprehensive measure of the DTI data. Further development should be carried out to improve DTI Fingerprinting technology in clinics.

  19. Transparent Fingerprint Sensor System for Large Flat Panel Display.

    Science.gov (United States)

    Seo, Wonkuk; Pi, Jae-Eun; Cho, Sung Haeung; Kang, Seung-Youl; Ahn, Seong-Deok; Hwang, Chi-Sun; Jeon, Ho-Sik; Kim, Jong-Uk; Lee, Myunghee

    2018-01-19

    In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT) sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO) TFT sensor array and associated custom Read-Out IC (ROIC) are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE) amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC). To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger's ridges and valleys through the fingerprint sensor array.

  20. Examination of Zinc Oxide Nanoparticles as a Fluorescent Fingerprint Detection Powder

    International Nuclear Information System (INIS)

    Tun Tun Lin

    2010-12-01

    Detection of latent fingerprint was performed using zinc oxide nanoparticles which were produced by simple and efficient method in aqueous media from zinc nitrate. Synthesized ZnO nanoparticles were characterized by XRD, SEM and AFM for ZnO purification and particle size examination. In this paper an effort has been made to compare the results of using ZnO nanoparticles and conventional fingerprint powders such as ZnO bulk powder, CaO, TiO2, printer toner powder and graphite. Fingerprints on different materials were also examined by the use of ZnO and Graphite powder, which is currently used in the Central Intelligence Department of Myanmar Police Force.From this research, it was observed that zinc oxide nanoparticles powder produced a much clearer picture of the fingerprints, compared to conventional powders and it has very good quality at sticking to the fingerprint residue but not to the background surface.

  1. Preparation of micro/nanostructure TiO2 spheres by controlling pollen as hard template and soft template.

    Science.gov (United States)

    Yang, Xiaohui; Xu, Bin; Zhang, Xuehong; Song, Xiuqin; Chen, Rufen

    2014-09-01

    In this paper, micro/nanostructure TiO2 spheres were synthesized by a sunflower pollen induced and self-assembly mineralization process, in which a titania precursor and pollen reacted in one-pot at normal pressure. In this paper, the bio-template advantage, as hard and soft template is fully demonstrated. The superiority of our synthesis is that we not only can control pollen as hard template, but also can control it as soft template only by changing reactions temperature. Under 80 degrees C of water bath, TiO2 microspheres which replicated the morphology of pollen were prepared by controlling pollen as hard template. Under 100 degrees C, hierarchical TiO2 spheres with complicated morphology, different from pollen template, were synthesized by using pollen as soft template. At the same time, judicious choice of the amount of pollen affords the synthesis of hierarchical structures spheres with adjustable morphology and crystal structure. The morphology can be tuned from microspheres constructed from TiO2 nanorods to nanospheres constructed from TiO2 nanoparticles, and the crystal structure can be tuned from rutile to anatase. More over this anatase phase can be keep better even at high temperature of 1000 degrees C. The as-prepared micro/nano structure photocatalysts not only have high photocatalytic activities, but also have good separability and reuse performance.

  2. Biometric templates selection and update using quality measures

    Science.gov (United States)

    Abboud, Ali J.; Jassim, Sabah A.

    2012-06-01

    To deal with severe variation in recording conditions, most biometric systems acquire multiple biometric samples, at the enrolment stage, for the same person and then extract their individual biometric feature vectors and store them in the gallery in the form of biometric template(s), labelled with the person's identity. The number of samples/templates and the choice of the most appropriate templates influence the performance of the system. The desired biometric template(s) selection technique must aim to control the run time and storage requirements while improving the recognition accuracy of the biometric system. This paper is devoted to elaborating on and discussing a new two stages approach for biometric templates selection and update. This approach uses a quality-based clustering, followed by a special criterion for the selection of an ultimate set of biometric templates from the various clusters. This approach is developed to select adaptively a specific number of templates for each individual. The number of biometric templates depends mainly on the performance of each individual (i.e. gallery size should be optimised to meet the needs of each target individual). These experiments have been conducted on two face image databases and their results will demonstrate the effectiveness of proposed quality-guided approach.

  3. Optimizing preventive maintenance with maintenance templates

    International Nuclear Information System (INIS)

    Dozier, I.J.

    1996-01-01

    Rising operating costs has caused maintenance professionals to rethink their strategy for preventive maintenance (PM) programs. Maintenance Templates are pre-engineered PM task recommendations for a component type based on application of the component. Development of the maintenance template considers the dominant failure cause of the component and the type of preventive maintenance that can predict or prevent the failure from occurring. Maintenance template development also attempts to replace fixed frequency tasks with condition monitoring tasks such as vibration analysis or thermography. For those components that have fixed frequency PM intervals, consideration is given to the maintenance drivers such as criticality, environment and usage. This helps to maximize the PM frequency intervals and maximize the component availability. Maintenance Templates have been used at PECO Energy's Limerick Generating Station during the Reliability Centered Maintenance (RCM) Process to optimize their PM program. This paper describes the development and uses of the maintenance templates

  4. dna and seed proteins fingerprinting of egyptian crop plants

    African Journals Online (AJOL)

    Dr. Haddad

    2012-11-01

    Nov 1, 2012 ... combinations were used for fingerprinting six cultivars which belongs to barley, rice and wheat cultivars leading to the production of numerous AFLP bands, 300 of them were polymorphic. Thirty SSR markers were obtained from fingerprinting eight cultivars belonging to the five studied species using 11.

  5. [Study of genome instability using DNA fingerprinting of the offspring of male mice subjected to chronic low dose gamma irradiation].

    Science.gov (United States)

    Bezlepkin, V G; Vasil'eva, G V; Lomaeva, M G; Sirota, N P; Gaziev, A I

    2000-01-01

    By a polymerase chain reaction with an arbitrary primer (AP-PCR), the possibility of transmission of genome instability to somatic cells of the offspring (F1 generation) from male parents of mice exposed to chronic low-level gamma-radiation was studied. Male BALB/c mice 15 days after exposure to 10-50 cGy were mated with unirradiated females. Biopsies were taken from tale tips of two month-old offspring mice and DNA was isolated. The primer in the AP-PCR was a 20-mer oligonucleotide flanking the microsatellite locus Atp1b2 on chromosome 11 of the mouse. A comparative analysis of individual fingerprints of AP-PCR products on DNA-templates from the offspring of irradiated and unirradiated male mice revealed an increased variability of microsatellite-associated sequences in the genome of the offspring of the males exposed to 25 and 50 cGy. The DNA-fingerprints of the offspring of male mice exposed to chronic irradiation with the doses 10 and 25 cGy 15 days before fertilization (at the post-meiotic stage of spermatogenesis) showed an increased frequency of "non-parent bands". The results of the study point to the possibility of transmission to the offspring somatic cells of changes increasing genome instability from male parents exposed to chronic low-level radiation prior to fertilization.

  6. DNA fingerprinting in botany: past, present, future

    OpenAIRE

    Nybom, Hilde; Weising, Kurt; Rotter, Björn

    2014-01-01

    Almost three decades ago Alec Jeffreys published his seminal Nature papers on the use of minisatellite probes for DNA fingerprinting of humans (Jeffreys and colleagues Nature 1985, 314:67–73 and Nature 1985, 316:76–79). The new technology was soon adopted for many other organisms including plants, and when Hilde Nybom, Kurt Weising and Alec Jeffreys first met at the very First International Conference on DNA Fingerprinting in Berne, Switzerland, in 1990, everybody was enthusiastic about the n...

  7. Accessible biometrics: A frustrated total internal reflection approach to imaging fingerprints.

    Science.gov (United States)

    Smith, Nathan D; Sharp, James S

    2017-05-01

    Fingerprints are widely used as a means of identifying persons of interest because of the highly individual nature of the spatial distribution and types of features (or minuta) found on the surface of a finger. This individuality has led to their wide application in the comparison of fingerprints found at crime scenes with those taken from known offenders and suspects in custody. However, despite recent advances in machine vision technology and image processing techniques, fingerprint evidence is still widely being collected using outdated practices involving ink and paper - a process that can be both time consuming and expensive. Reduction of forensic service budgets increasingly requires that evidence be gathered and processed more rapidly and efficiently. However, many of the existing digital fingerprint acquisition devices have proven too expensive to roll out on a large scale. As a result new, low-cost imaging technologies are required to increase the quality and throughput of the processing of fingerprint evidence. Here we describe an inexpensive approach to digital fingerprint acquisition that is based upon frustrated total internal reflection imaging. The quality and resolution of the images produced are shown to be as good as those currently acquired using ink and paper based methods. The same imaging technique is also shown to be capable of imaging powdered fingerprints that have been lifted from a crime scene using adhesive tape or gel lifters. Copyright © 2017 The Chartered Society of Forensic Sciences. Published by Elsevier B.V. All rights reserved.

  8. Solving the Mystery of Fading Fingerprints with London Dispersion Forces.

    Science.gov (United States)

    Kimbrough, Doris R.; DeLorenzo, Ronald

    1998-01-01

    Focuses on the kidnapping of a child whose fingerprints were not found inside the crime vehicle. Discusses the investigation that followed and led to knowledge of the differences between the fingerprints of children and adults. (DDR)

  9. Improving the Security of the U.S. Aeronautical Domain: Adopting an Intelligence-Led, Risk-Based Strategy and Partnership

    Science.gov (United States)

    2010-12-01

    a fingerprint -based criminal history records check (CHRC) for individuals seeking unescorted access to secure areas of an airport (§ 1542.209...What needs to be reduced? • What needs to be created? 111 With this information answered, a strategy canvas was then created to convey the

  10. Spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of Curcuma aromatica.

    Science.gov (United States)

    Liu, Meiqiong; Wu, Youjiao; Huang, Shushi; Liu, Huagang; Feng, Jie

    2018-02-23

    Curcuma aromatica is used as a traditional Chinese medicine, and it is mainly distributed in Guangxi, China. In this study, 10 batches of C. aromatica were collected from different origins in Guangxi. The fingerprints were established by HPLC technique to investigate the quality stability of C. aromatica. The spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of C. aromatica was assessed by similarity analysis, gray relational analysis and multiple linear regression analysis. From the results, the similarity values between each batch of C. aromatica and reference fingerprint were >0.880, indicating the good quality stability of the 10 batches of C. aromatica. Twenty common peaks were selected as the fingerprints to evaluate the quality and hypolipidemic effect of C. aromatica. The results of spectrum-effect relationship showed that peaks 10, 18, 13, 15 and 17 in the fingerprints were closely related to hypolipidemic effect. This study successfully established the spectrum-effect relationship between HPLC fingerprints and hypolipidemic effect of C. aromatica, which provided methods for quality control and more effectively studies on bioactive compounds of C. aromatica. It could also provide a new simple and effective method for utilizing the fingerprints to optimize the Chinese prescription and develop traditional Chinese medicine. Copyright © 2018 John Wiley & Sons, Ltd.

  11. [The template principle: paradigm of modern genetics].

    Science.gov (United States)

    Inge-Vechtomov, S G

    2013-01-01

    The idea of continuity in living systems, which was initially developed in mid-19th century, reached its peak in 1928 thanks to N.K. Koltsov, who proposed the template principle in chromosome reproduction. The determination of genetic functions of nucleic acids and the advent of molecular genetics led to F. Crick's statement of the central dogma of molecular biology in 1958. This dogma became a contemporary version of the template principle (templates of the first order). The discovery of "protein inheritance" underlay the notion of steric or conformational templates (second order) for reproducing conformation in a number of proteins. The template principle supplemented by this notion claims to be the main paradigm of modern genetics.

  12. Hard template synthesis of metal nanowires

    OpenAIRE

    Kawamura, Go; Muto, Hiroyuki; Matsuda, Atsunori

    2014-01-01

    Metal nanowires (NWs) have attracted much attention because of their high electron conductivity, optical transmittance, and tunable magnetic properties. Metal NWs have been synthesized using soft templates such as surface stabilizing molecules and polymers, and hard templates such as anodic aluminum oxide, mesoporous oxide, carbon nanotubes. NWs prepared from hard templates are composites of metals and the oxide/carbon matrix. Thus, selecting appropriate elements can simplify the production o...

  13. A Modified Electrostatic Adsorption Apparatus for Latent Fingerprint Development on Unfired Cartridge Cases.

    Science.gov (United States)

    Xu, Jingyang; Zhang, Ziyuan; Zheng, Xiaochun; Bond, John W

    2017-05-01

    Visualization of latent fingerprints on metallic surfaces by the method of applying electrostatic charging and adsorption is considered as a promising chemical-free method, which has the merit of nondestruction, and is considered to be effective for some difficult situations such as aged fingerprint deposits or those exposed to environmental extremes. In fact, a portable electrostatic generator can be easily accessible in a local forensic technology laboratory, which is already widely used in the visualization of footwear impressions. In this study, a modified version of this electrostatic apparatus is proposed for latent fingerprint development and has shown great potential in visualizing fingerprints on metallic surfaces such as cartridge cases. Results indicate that this experimental arrangement can successfully develop aged latent fingerprints on metal surfaces, and we demonstrate its effectiveness compared with existing conventional fingerprint recovery methods. © 2016 American Academy of Forensic Sciences.

  14. Self-Organizing Maps for Fingerprint Image Quality Assessment

    DEFF Research Database (Denmark)

    Olsen, Martin Aastrup; Tabassi, Elham; Makarov, Anton

    2013-01-01

    Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification and iden......Fingerprint quality assessment is a crucial task which needs to be conducted accurately in various phases in the biometric enrolment and recognition processes. Neglecting quality measurement will adversely impact accuracy and efficiency of biometric recognition systems (e.g. verification...... machine learning techniques. We train a self-organizing map (SOM) to cluster blocks of fingerprint images based on their spatial information content. The output of the SOM is a high-level representation of the finger image, which forms the input to a Random Forest trained to learn the relationship between...

  15. Detecting anthropogenic climate change with an optimal fingerprint method

    International Nuclear Information System (INIS)

    Hegerl, G.C.; Storch, H. von; Hasselmann, K.; Santer, B.D.; Jones, P.D.

    1994-01-01

    We propose a general fingerprint strategy to detect anthropogenic climate change and present application to near surface temperature trends. An expected time-space-variable pattern of anthropogenic climate change (the 'signal') is identified through application of an appropriate optimally matched space-time filter (the 'fingerprint') to the observations. The signal and the fingerprint are represented in a space with sufficient observed and simulated data. The signal pattern is derived from a model-generated prediction of anthropogenic climate change. Application of the fingerprint filter to the data yields a scalar detection variable. The statistically optimal fingerprint is obtained by weighting the model-predicted pattern towards low-noise directions. A combination of model output and observations is used to estimate the noise characteristics of the detection variable, arising from the natural variability of climate in the absence of external forcing. We test then the null hypothesis that the observed climate change is part of natural climate variability. We conclude that a statistically significant externally induced warming has been observed, with the caveat of a possibly inadequate estimate of the internal climate variability. In order to attribute this warming uniquely to anthropogenic greenhouse gas forcing, more information on the climate's response to other forcing mechanisms (e.g. changes in solar radiation, volcanic or anthropogenic aerosols) and their interaction is needed. (orig./KW)

  16. Establishment and application of milk fingerprint by gel filtration chromatography.

    Science.gov (United States)

    Gao, P; Li, J; Li, Z; Hao, J; Zan, L

    2016-12-01

    Raw milk adulteration frequently occurs in undeveloped countries. It not only reduces the nutritional value of milk, but it is also harmful to consumers. In this paper, we focused on investigating an efficient method for the quality control of raw milk protein. A gel filtration chromatography (GFC) fingerprint method combined with chemometrics was developed for fingerprint analysis of raw milk. To optimize the GFC conditions, milk fat was removed by centrifugation, and GFC analysis was performed on a Superdex 75 10/300GL column (Just Scientific, Shanghai, China) with 0.2 M NaH 2 PO 4 -Na 2 HPO 4 buffer (pH 7.0) as the mobile phase. The flow rate was 0.5mL/min, and the detection wavelength was set at 280 nm. Ten batches of 120 raw milk samples were analyzed to establish the GFC fingerprint under optimal conditions. Six major peaks common to the chromatogram of each raw milk sample were selected for fingerprint analysis, and the characteristic peaks were used to establish a standard chromatographic fingerprint. Principal component analysis was then applied to classify GFC information of adulterated milk and raw milk, allowing adulterated samples to be effectively screened out from the raw milk in principal component analysis scores plot. The fingerprint method demonstrates promising features in detecting milk protein adulteration. Copyright © 2016 American Dairy Science Association. Published by Elsevier Inc. All rights reserved.

  17. Polarization-based and specular-reflection-based noncontact latent fingerprint imaging and lifting

    Science.gov (United States)

    Lin, Shih-Schön; Yemelyanov, Konstantin M.; Pugh, Edward N., Jr.; Engheta, Nader

    2006-09-01

    In forensic science the finger marks left unintentionally by people at a crime scene are referred to as latent fingerprints. Most existing techniques to detect and lift latent fingerprints require application of a certain material directly onto the exhibit. The chemical and physical processing applied to the fingerprint potentially degrades or prevents further forensic testing on the same evidence sample. Many existing methods also have deleterious side effects. We introduce a method to detect and extract latent fingerprint images without applying any powder or chemicals on the object. Our method is based on the optical phenomena of polarization and specular reflection together with the physiology of fingerprint formation. The recovered image quality is comparable to existing methods. In some cases, such as the sticky side of tape, our method shows unique advantages.

  18. Ubiquity of Wi-Fi: Crowdsensing Properties for Urban Fingerprint Positioning

    Directory of Open Access Journals (Sweden)

    LECA, C. L.

    2017-11-01

    Full Text Available Positioning systems based on location fingerprinting have become an area of intense research, mainly with the aim of providing indoor localization. Many challenges arise when trying to deploy location fingerprinting to an outdoor environment. The main problem is achieving coverage of large outdoor spaces, which needs an intensive data gathering effort. This paper proposes the use of mobile crowdsensing in order to build a fingerprint database consisting of Wi-Fi networks received signal strength measurements. Mobile crowdsensing is represented by the usage of smart-phones equipped with GPS and Wi-Fi sensors for the collection of fingerprints. The primary objective of this work is to prove the feasibility of urban positioning using Wi-Fi crowdsensed data by showing that Wi-Fi networks are ubiquitous in urban areas. We then examine the gathered data and report our findings on challenges in building and maintaining a large-scale fingerprint database, the influence of the data collection method on the Wi-Fi data and the influence of fading on measurements. As Wi-Fi access-points are shown to exhibit mobility, we also propose and analyze methods for detecting and classification of mobile and static access-points.

  19. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    Science.gov (United States)

    Salamon, H; Segal, M R; Ponce de Leon, A; Small, P M

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is positively correlated for fragments within a lane, an align-and-count method that compensates for relative scaling of lanes reliably counts matching fragments between lanes. Results of a two-step method we developed to cluster identical fingerprints agree closely with 5 years of computer-assisted visual matching among 1,335 M. tuberculosis fingerprints. Fully documented and validated methods of automated comparison and clustering will greatly expand the scope of molecular epidemiology.

  20. Hyperbolic Location Fingerprinting: A Calibration-Free Solution for Handling Differences in Signal Strength

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Munk, Carsten Valdemar

    2008-01-01

    records fingerprints as signal-strength ratios between pairs of base stations instead of absolute signal-strength values. The proposed solution has been evaluated by extending two well-known location fingerprinting techniques to hyperbolic location fingerprinting. The extended techniques have been tested...

  1. Zone-based RSS Reporting for Location Fingerprinting

    DEFF Research Database (Denmark)

    Kjærgaard, Mikkel Baun; Treu, Georg; Linnhoff–Popien, Claudia

    2007-01-01

    In typical location fingerprinting systems a tracked terminal reports sampled Received Signal Strength (RSS) values to a location server, which estimates its position based on a database of pre-recorded RSS fingerprints. So far, poll-based and periodic RSS reporting has been proposed. However......, for supporting proactive Location-based Services (LBSs), triggered by pre-defined spatial events, the periodic protocol is inefficient. Hence, this paper introduces zone-based RSS reporting: the location server translates geographical zones defined by the LBS into RSS-based representations, which are dynamically...

  2. Extracting valley-ridge lines from point-cloud-based 3D fingerprint models.

    Science.gov (United States)

    Pang, Xufang; Song, Zhan; Xie, Wuyuan

    2013-01-01

    3D fingerprinting is an emerging technology with the distinct advantage of touchless operation. More important, 3D fingerprint models contain more biometric information than traditional 2D fingerprint images. However, current approaches to fingerprint feature detection usually must transform the 3D models to a 2D space through unwrapping or other methods, which might introduce distortions. A new approach directly extracts valley-ridge features from point-cloud-based 3D fingerprint models. It first applies the moving least-squares method to fit a local paraboloid surface and represent the local point cloud area. It then computes the local surface's curvatures and curvature tensors to facilitate detection of the potential valley and ridge points. The approach projects those points to the most likely valley-ridge lines, using statistical means such as covariance analysis and cross correlation. To finally extract the valley-ridge lines, it grows the polylines that approximate the projected feature points and removes the perturbations between the sampled points. Experiments with different 3D fingerprint models demonstrate this approach's feasibility and performance.

  3. Learning templates for artistic portrait lighting analysis.

    Science.gov (United States)

    Chen, Xiaowu; Jin, Xin; Wu, Hongyu; Zhao, Qinping

    2015-02-01

    Lighting is a key factor in creating impressive artistic portraits. In this paper, we propose to analyze portrait lighting by learning templates of lighting styles. Inspired by the experience of artists, we first define several novel features that describe the local contrasts in various face regions. The most informative features are then selected with a stepwise feature pursuit algorithm to derive the templates of various lighting styles. After that, the matching scores that measure the similarity between a testing portrait and those templates are calculated for lighting style classification. Furthermore, we train a regression model by the subjective scores and the feature responses of a template to predict the score of a portrait lighting quality. Based on the templates, a novel face illumination descriptor is defined to measure the difference between two portrait lightings. Experimental results show that the learned templates can well describe the lighting styles, whereas the proposed approach can assess the lighting quality of artistic portraits as human being does.

  4. An atomistic fingerprint algorithm for learning ab initio molecular force fields

    Science.gov (United States)

    Tang, Yu-Hang; Zhang, Dongkun; Karniadakis, George Em

    2018-01-01

    Molecular fingerprints, i.e., feature vectors describing atomistic neighborhood configurations, is an important abstraction and a key ingredient for data-driven modeling of potential energy surface and interatomic force. In this paper, we present the density-encoded canonically aligned fingerprint algorithm, which is robust and efficient, for fitting per-atom scalar and vector quantities. The fingerprint is essentially a continuous density field formed through the superimposition of smoothing kernels centered on the atoms. Rotational invariance of the fingerprint is achieved by aligning, for each fingerprint instance, the neighboring atoms onto a local canonical coordinate frame computed from a kernel minisum optimization procedure. We show that this approach is superior over principal components analysis-based methods especially when the atomistic neighborhood is sparse and/or contains symmetry. We propose that the "distance" between the density fields be measured using a volume integral of their pointwise difference. This can be efficiently computed using optimal quadrature rules, which only require discrete sampling at a small number of grid points. We also experiment on the choice of weight functions for constructing the density fields and characterize their performance for fitting interatomic potentials. The applicability of the fingerprint is demonstrated through a set of benchmark problems.

  5. Template Generation and Selection Algorithms

    NARCIS (Netherlands)

    Guo, Y.; Smit, Gerardus Johannes Maria; Broersma, Haitze J.; Heysters, P.M.; Badaway, W.; Ismail, Y.

    The availability of high-level design entry tooling is crucial for the viability of any reconfigurable SoC architecture. This paper presents a template generation method to extract functional equivalent structures, i.e. templates, from a control data flow graph. By inspecting the graph the algorithm

  6. Mid-infrared supercontinuum generation in the fingerprint region

    DEFF Research Database (Denmark)

    Møller, Uffe Visbech; Petersen, Christian Rosenberg; Kubat, Irnis

    The mid-infrared spectral region is of great technical and scientific interest because most molecules display fundamental vibrational absorptions in this region, leaving distinctive spectral fingerprints. Here, we demonstrate experimentally that launching intense ultra-short pulses with a central...... the potential of fibres to emit across the mid-infrared molecular fingerprint region, which is of key importance for applications such as early cancer diagnostics, gas sensing and food quality control....

  7. Graphene Nanopres for DNA Fingerprinting

    Science.gov (United States)

    Ahmed, Towfiq; Balatsky, Alexander V.; Haraldsen, J. T.; Schuller, Ivan K.; di Ventra, M.; Wikfeldt, K. T.

    2013-03-01

    The recent progress in nanopore experiments with transverse current is important for the development of fast, accurate and cheap finger-printing techniques for single nucleotide. Despite its enormous potential for the next generation DNA sequencing technology, the presence of large noise in the temporal spectrum of transverse current remains a big challenge for getting highly accurate interpretation of data. In this paper we present our abinitio calculations, and propose graphene based device for DNA fingerprinting. We calculate transmission current through graphene for each DNA base (A,C,G,T). As shown in our work, a proper time-series analysis of a signal provides a higher quality information in identifying single bio-molecule is translocating through the nanopores. This work is supported by LANL, Nordita, US DOE, AFOSR, and NIH.

  8. Fissile fingerprints

    International Nuclear Information System (INIS)

    Edwards, R.

    1995-01-01

    This article looks at recent research which may allow police and customs officers to detect smuggled weapons-grade plutonium and uranium. Contrary to popular opinion, nuclear materials do not have a nuclear ''fingerprint'' but enough information can be gleaned from sources to confirm what has been learnt from other data. Indeed, two leading nuclear laboratories can look at the same analytical results and draw different conclusions. The case of a lead cylinder seized from a German garage is examined to illustrate the confusion. (UK)

  9. Performance analysis of a hybrid fingerprint extracted from optical coherence tomography fingertip scans

    CSIR Research Space (South Africa)

    Darlow, Luke N

    2016-06-01

    Full Text Available The Hybrid fingerprint is a local-quality-specific blend of the surface and internal fingerprints, extracted from optical coherence tomography scans. Owing to its origin, and the manner in which it is obtained, the Hybrid fingerprint is a high...

  10. Polynucleotide probes that target a hypervariable region of 16S rRNA genes to identify bacterial isolates corresponding to bands of community fingerprints.

    Science.gov (United States)

    Heuer, H; Hartung, K; Wieland, G; Kramer, I; Smalla, K

    1999-03-01

    Temperature gradient gel electrophoresis (TGGE) is well suited for fingerprinting bacterial communities by separating PCR-amplified fragments of 16S rRNA genes (16S ribosomal DNA [rDNA]). A strategy was developed and was generally applicable for linking 16S rDNA from community fingerprints to pure culture isolates from the same habitat. For this, digoxigenin-labeled polynucleotide probes were generated by PCR, using bands excised from TGGE community fingerprints as a template, and applied in hybridizations with dot blotted 16S rDNA amplified from bacterial isolates. Within 16S rDNA, the hypervariable V6 region, corresponding to positions 984 to 1047 (Escherichia coli 16S rDNA sequence), which is a subset of the region used for TGGE (positions 968 to 1401), best met the criteria of high phylogenetic variability, required for sufficient probe specificity, and closely flanking conserved priming sites for amplification. Removal of flanking conserved bases was necessary to enable the differentiation of closely related species. This was achieved by 5' exonuclease digestion, terminated by phosphorothioate bonds which were synthesized into the primers. The remaining complementary strand was removed by single-strand-specific digestion. Standard hybridization with truncated probes allowed differentiation of bacteria which differed by only two bases within the probe target site and 1.2% within the complete 16S rDNA. However, a truncated probe, derived from an excised TGGE band of a rhizosphere community, hybridized with three phylogenetically related isolates with identical V6 sequences. Only one of the isolates comigrated with the excised band in TGGE, which was shown to be due to identical sequences, demonstrating the utility of a combined TGGE and V6 probe approach.

  11. Investigation of gamma-ray fingerprint identifying mechanism for the types of radiation sources

    CERN Document Server

    Liu Su Ping; Gu Dang Chang; Gong-Jian; Hao Fan Hua; Hu Guang Chun

    2002-01-01

    Radiation fingerprints sometimes can be used to label and identify the radiation resources. For instance, in a future nuclear reduction treaty that requires verification of irreversible dismantling of reduced nuclear warheads, the radiation fingerprints of nuclear warheads are expected to play a key role in labelling and identifying the reduced warheads. It would promote the development of nuclear warheads deep-cuts verification technologies if authors start right now some investigations on the issues related to the radiation fingerprints. The author dedicated to the investigation of gamma-ray fingerprint identifying mechanism for the types of radiation resources. The purpose of the identifying mechanism investigation is to find a credible way to tell whether any two gamma-ray spectral fingerprints that are under comparison are radiated from the same resource. The authors created the spectrum pattern comparison (SPC) to study the comparability of the two radiation fingerprints. Guided by the principle of SPC,...

  12. images_template

    Data.gov (United States)

    National Aeronautics and Space Administration — Images for the website template go here. It will not change their names or locations, but will hopefully help to organize them. Oh, but for a directory structure...

  13. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M. [Los Alamos National Lab., NM (United States); Hopper, T. [Federal Bureau of Investigation, Washington, DC (United States)

    1993-05-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI`s Integrated Automated Fingerprint Identification System.

  14. Transparent Fingerprint Sensor System for Large Flat Panel Display

    Directory of Open Access Journals (Sweden)

    Wonkuk Seo

    2018-01-01

    Full Text Available In this paper, we introduce a transparent fingerprint sensing system using a thin film transistor (TFT sensor panel, based on a self-capacitive sensing scheme. An armorphousindium gallium zinc oxide (a-IGZO TFT sensor array and associated custom Read-Out IC (ROIC are implemented for the system. The sensor panel has a 200 × 200 pixel array and each pixel size is as small as 50 μm × 50 μm. The ROIC uses only eight analog front-end (AFE amplifier stages along with a successive approximation analog-to-digital converter (SAR ADC. To get the fingerprint image data from the sensor array, the ROIC senses a capacitance, which is formed by a cover glass material between a human finger and an electrode of each pixel of the sensor array. Three methods are reviewed for estimating the self-capacitance. The measurement result demonstrates that the transparent fingerprint sensor system has an ability to differentiate a human finger’s ridges and valleys through the fingerprint sensor array.

  15. Finger-vein and fingerprint recognition based on a feature-level fusion method

    Science.gov (United States)

    Yang, Jinfeng; Hong, Bofeng

    2013-07-01

    Multimodal biometrics based on the finger identification is a hot topic in recent years. In this paper, a novel fingerprint-vein based biometric method is proposed to improve the reliability and accuracy of the finger recognition system. First, the second order steerable filters are used here to enhance and extract the minutiae features of the fingerprint (FP) and finger-vein (FV). Second, the texture features of fingerprint and finger-vein are extracted by a bank of Gabor filter. Third, a new triangle-region fusion method is proposed to integrate all the fingerprint and finger-vein features in feature-level. Thus, the fusion features contain both the finger texture-information and the minutiae triangular geometry structure. Finally, experimental results performed on the self-constructed finger-vein and fingerprint databases are shown that the proposed method is reliable and precise in personal identification.

  16. A novel hand-type detection technique with fingerprint sensor

    Science.gov (United States)

    Abe, Narishige; Shinzaki, Takashi

    2013-05-01

    In large-scale biometric authentication systems such as the US-Visit (USA), a 10-fingerprints scanner which simultaneously captures four fingerprints is used. In traditional systems, specific hand-types (left or right) are indicated, but it is difficult to detect hand-type due to the hand rotation and the opening and closing of fingers. In this paper, we evaluated features that were extracted from hand images (which were captured by a general optical scanner) that are considered to be effective for detecting hand-type. Furthermore, we extended the knowledge to real fingerprint images, and evaluated the accuracy with which it detects hand-type. We obtained an accuracy of about 80% with only three fingers (index, middle, ring finger).

  17. Visualization of latent fingerprints beneath opaque electrical tapes by optical coherence tomography

    Science.gov (United States)

    Liu, Kangkang; Zhang, Ning; Meng, Li; Li, Zhigang; Xu, Xiaojing

    2018-03-01

    Electrical tape is found as one type of important trace evidence in crime scene. For example, it is very frequently used to insulate wires in explosive devices in many criminal cases. The fingerprints of the suspects were often left on the adhesive side of the tapes, which can provide very useful clues for the investigation and make it possible for individual identification. The most commonly used method to detect and visualize those latent fingerprints is to peel off each layer of the tapes first and then adopt the chemical methods to develop the fingerprints on the tapes. However, the peeling-off and chemical development process would degrade and contaminate the fingerprints and thus adversely affect the accuracy of identification. Optical coherence tomography (OCT) is a novel forensic imaging modality based on lowcoherence interferometry, which has the advantages of non-destruction, micrometer-level high resolution and crosssectional imaging. In this study, a fiber-based spectral-domain OCT (SD-OCT) system with {6μm resolution was employed to obtain the image of fingerprint sandwiched between two opaque electrical tapes without any pre-processing procedure like peeling-off. Three-dimensional (3D) OCT reconstruction was performed and the subsurface image was produced to visualize the latent fingerprints. The results demonstrate that OCT is a promising tool for recovering the latent fingerprints hidden beneath opaque electrical tape non-destructively and rapidly.

  18. DNA fingerprinting in forensics: past, present, future.

    Science.gov (United States)

    Roewer, Lutz

    2013-11-18

    DNA fingerprinting, one of the great discoveries of the late 20th century, has revolutionized forensic investigations. This review briefly recapitulates 30 years of progress in forensic DNA analysis which helps to convict criminals, exonerate the wrongly accused, and identify victims of crime, disasters, and war. Current standard methods based on short tandem repeats (STRs) as well as lineage markers (Y chromosome, mitochondrial DNA) are covered and applications are illustrated by casework examples. Benefits and risks of expanding forensic DNA databases are discussed and we ask what the future holds for forensic DNA fingerprinting.

  19. DNA fingerprinting, DNA barcoding, and next generation sequencing technology in plants.

    Science.gov (United States)

    Sucher, Nikolaus J; Hennell, James R; Carles, Maria C

    2012-01-01

    DNA fingerprinting of plants has become an invaluable tool in forensic, scientific, and industrial laboratories all over the world. PCR has become part of virtually every variation of the plethora of approaches used for DNA fingerprinting today. DNA sequencing is increasingly used either in combination with or as a replacement for traditional DNA fingerprinting techniques. A prime example is the use of short, standardized regions of the genome as taxon barcodes for biological identification of plants. Rapid advances in "next generation sequencing" (NGS) technology are driving down the cost of sequencing and bringing large-scale sequencing projects into the reach of individual investigators. We present an overview of recent publications that demonstrate the use of "NGS" technology for DNA fingerprinting and DNA barcoding applications.

  20. RF-Based Location Using Interpolation Functions to Reduce Fingerprint Mapping

    Science.gov (United States)

    Ezpeleta, Santiago; Claver, José M.; Pérez-Solano, Juan J.; Martí, José V.

    2015-01-01

    Indoor RF-based localization using fingerprint mapping requires an initial training step, which represents a time consuming process. This location methodology needs a database conformed with RSSI (Radio Signal Strength Indicator) measures from the communication transceivers taken at specific locations within the localization area. But, the real world localization environment is dynamic and it is necessary to rebuild the fingerprint database when some environmental changes are made. This paper explores the use of different interpolation functions to complete the fingerprint mapping needed to achieve the sought accuracy, thereby reducing the effort in the training step. Also, different distributions of test maps and reference points have been evaluated, showing the validity of this proposal and necessary trade-offs. Results reported show that the same or similar localization accuracy can be achieved even when only 50% of the initial fingerprint reference points are taken. PMID:26516862

  1. DNA Fingerprinting Using PCR: A Practical Forensic Science Activity

    Science.gov (United States)

    Choi, Hyun-Jung; Ahn, Jung Hoon; Ko, Minsu

    2008-01-01

    This paper describes a forensic science simulation programme applicable for use in colleges. Students were asked to find a putative suspect by DNA fingerprinting using a simple protocol developed in this study. DNA samples were obtained from a hair root and a drop of blood, common sources of DNA in forensic science. The DNA fingerprinting protocol…

  2. Application of DNA fingerprints for cell-line individualization.

    OpenAIRE

    Gilbert, D A; Reid, Y A; Gail, M H; Pee, D; White, C; Hay, R J; O'Brien, S J

    1990-01-01

    DNA fingerprints of 46 human cell lines were derived using minisatellite probes for hypervariable genetic loci. The incidence of 121 HaeIII DNA fragments among 33 cell lines derived from unrelated individuals was used to estimate allelic and genotypic frequencies for each fragment and for composite individual DNA fingerprints. We present a quantitative estimate of the extent of genetic difference between individuals, an estimate based on the percentage of restriction fragments at which they d...

  3. A new method of artificial latent fingerprint creation using artificial sweat and inkjet printer.

    Science.gov (United States)

    Hong, Sungwook; Hong, Ingi; Han, Aleum; Seo, Jin Yi; Namgung, Juyoung

    2015-12-01

    In order to study fingerprinting in the field of forensic science, it is very important to have two or more latent fingerprints with identical chemical composition and intensity. However, it is impossible to obtain identical fingerprints, in reality, because fingerprinting comes out slightly differently every time. A previous research study had proposed an artificial fingerprint creation method in which inkjet ink was replaced with amino acids and sodium chloride solution: the components of human sweat. But, this method had some drawbacks: divalent cations were not added while formulating the artificial sweat solution, and diluted solutions were used for creating weakly deposited latent fingerprint. In this study, a method was developed for overcoming the drawbacks of the methods used in the previous study. Several divalent cations were added in this study because the amino acid-ninhydrin (or some of its analogues) complex is known to react with divalent cations to produce a photoluminescent product; and, similarly, the amino acid-1,2-indanedione complex is known to be catalyzed by a small amount of zinc ions to produce a highly photoluminescent product. Also, in this study, a new technique was developed which enables to adjust the intensity when printing the latent fingerprint patterns. In this method, image processing software is used to control the intensity of the master fingerprint patterns, which adjusts the printing intensity of the latent fingerprints. This new method opened the way to produce a more realistic artificial fingerprint in various strengths with one artificial sweat working solution. Copyright © 2015 Elsevier Ireland Ltd. All rights reserved.

  4. Nucleus fingerprinting for the unique identification of Feulgen-stained nuclei

    Science.gov (United States)

    Friedrich, David; Brozio, Matthias; Bell, André; Biesterfeld, Stefan; Böcking, Alfred; Aach, Til

    2012-03-01

    DNA Image Cytometry is a method for non-invasive cancer diagnosis which measures the DNA content of Feulgen-stained nuclei. DNA content is measured using a microscope system equipped with a digital camera as a densitometer and estimating the DNA content from the absorption of light when passing through the nuclei. However, a DNA Image Cytometry measurement is only valid if each nucleus is only measured once. To assist the user in preventing multiple measurements of the same nucleus, we have developed a unique digital identifier for the characterization of Feulgen-stained nuclei, the so called Nucleus Fingerprint. Only nuclei with a new fingerprint can be added to the measurement. This fingerprint is based on basic nucleus features, the contour of the nucleus and the spatial relationship to nuclei in the vicinity. Based on this characterization, a classifier for testing two nuclei for identity is presented. In a pairwise comparison of ~40000 pairs of mutually different nuclei, 99.5% were classified as different. In another 450 tests, the fingerprints of the same nucleus recorded a second time were in all cases judged identical. We therefore conclude that our Nucleus Fingerprint approach robustly prevents the repeated measurement of nuclei in DNA Image Cytometry.

  5. Fingerprint Image Enhancement Based on Second Directional Derivative of the Digital Image

    Directory of Open Access Journals (Sweden)

    Onnia Vesa

    2002-01-01

    Full Text Available This paper presents a novel approach of fingerprint image enhancement that relies on detecting the fingerprint ridges as image regions where the second directional derivative of the digital image is positive. A facet model is used in order to approximate the derivatives at each image pixel based on the intensity values of pixels located in a certain neighborhood. We note that the size of this neighborhood has a critical role in achieving accurate enhancement results. Using neighborhoods of various sizes, the proposed algorithm determines several candidate binary representations of the input fingerprint pattern. Subsequently, an output binary ridge-map image is created by selecting image zones, from the available binary image candidates, according to a MAP selection rule. Two public domain collections of fingerprint images are used in order to objectively assess the performance of the proposed fingerprint image enhancement approach.

  6. The FBI wavelet/scalar quantization standard for gray-scale fingerprint image compression

    Energy Technology Data Exchange (ETDEWEB)

    Bradley, J.N.; Brislawn, C.M. (Los Alamos National Lab., NM (United States)); Hopper, T. (Federal Bureau of Investigation, Washington, DC (United States))

    1993-01-01

    The FBI has recently adopted a standard for the compression of digitized 8-bit gray-scale fingerprint images. The standard is based on scalar quantization of a 64-subband discrete wavelet transform decomposition of the images, followed by Huffman coding. Novel features of the algorithm include the use of symmetric boundary conditions for transforming finite-length signals and a subband decomposition tailored for fingerprint images scanned at 500 dpi. The standard is intended for use in conjunction with ANSI/NBS-CLS 1-1993, American National Standard Data Format for the Interchange of Fingerprint Information, and the FBI's Integrated Automated Fingerprint Identification System.

  7. [Baking method of Platycladi Cacumen Carbonisatum based on similarity of UPLC fingerprints].

    Science.gov (United States)

    Shan, Mingqiu; Chen, Chao; Yao, Xiaodong; Ding, Anwei

    2010-09-01

    To establish a baking method of Platycladi Cacumen Carbonisatum for providing a new idea to Carbonic Herbs' research. Samples were prepared in an oven for different time at different temperatures separately. Then the fingerprints of the samples were determined by UPLC. According to the standard fingerprint, the similarities of the samples' fingerprints were compared. The similarities of 3 samples, which were baked at 230 degrees C for 20 min, 30 min and at 240 degrees C for 20 min, were above 0.96. According to the similarities of the fingerprints and in view of the appearances, Platycladi Cacumen Carbonizing should be baked at 230 degrees C for 20 min.

  8. Fingerprint matching algorithm for poor quality images

    Directory of Open Access Journals (Sweden)

    Vedpal Singh

    2015-04-01

    Full Text Available The main aim of this study is to establish an efficient platform for fingerprint matching for low-quality images. Generally, fingerprint matching approaches use the minutiae points for authentication. However, it is not such a reliable authentication method for low-quality images. To overcome this problem, the current study proposes a fingerprint matching methodology based on normalised cross-correlation, which would improve the performance and reduce the miscalculations during authentication. It would decrease the computational complexities. The error rate of the proposed method is 5.4%, which is less than the two-dimensional (2D dynamic programming (DP error rate of 5.6%, while Lee's method produces 5.9% and the combined method has 6.1% error rate. Genuine accept rate at 1% false accept rate is 89.3% but at 0.1% value it is 96.7%, which is higher. The outcome of this study suggests that the proposed methodology has a low error rate with minimum computational effort as compared with existing methods such as Lee's method and 2D DP and the combined method.

  9. A facile template method to synthesize significantly improved LiNi0.5Mn1.5O4 using corn stalk as a bio-template

    International Nuclear Information System (INIS)

    Liu, Guiyang; Kong, Xin; Sun, Hongyan; Wang, Baosen; Yi, Zhongzhou; Wang, Quanbiao

    2014-01-01

    In order to simplify the template method for the synthesis of cathode materials for lithium ion batteries, a facile template method using plant stalks as bio-templates has been introduced. Based on this method, LiNi 0.5 Mn 1.5 O 4 spinel with a significantly improved electrochemical performance has been synthesized using corn stalk as a template. X-ray diffraction (XRD), Fourier transform infrared pectroscopy (FTIR) and scanning electron microscope (SEM) have been used to investigate the phase composition and micro-morphologies of the products. Charge-discharge measurements in lithium cells, cyclic voltammetry (CV) and Electrochemical impedance spectroscopy (EIS) have been used to study the electrochemical performance of the products. The results indicate that the templated product exhibits higher crystallinity than that of non-templated product. Both of the templated product and the non-templated product are combination of the ordered space group P4 3 32 and the disordered Fd-3 m. The specific BET surface area of the templated product is about twice larger than that of the non-templated product. Moreover, the electrochemical performances of the templated product including specific capacity, cycling stability and rate capability are significantly improved as compared with the non-templated product, due to its higher crystallinity, larger Li + diffusion coefficient and lower charge transfer resistance

  10. Fingerprint Matching by Thin-plate Spline Modelling of Elastic Deformations

    NARCIS (Netherlands)

    Bazen, A.M.; Gerez, Sabih H.

    2003-01-01

    This paper presents a novel minutiae matching method that describes elastic distortions in fingerprints by means of a thin-plate spline model, which is estimated using a local and a global matching stage. After registration of the fingerprints according to the estimated model, the number of matching

  11. AIR-MRF: Accelerated iterative reconstruction for magnetic resonance fingerprinting.

    Science.gov (United States)

    Cline, Christopher C; Chen, Xiao; Mailhe, Boris; Wang, Qiu; Pfeuffer, Josef; Nittka, Mathias; Griswold, Mark A; Speier, Peter; Nadar, Mariappan S

    2017-09-01

    Existing approaches for reconstruction of multiparametric maps with magnetic resonance fingerprinting (MRF) are currently limited by their estimation accuracy and reconstruction time. We aimed to address these issues with a novel combination of iterative reconstruction, fingerprint compression, additional regularization, and accelerated dictionary search methods. The pipeline described here, accelerated iterative reconstruction for magnetic resonance fingerprinting (AIR-MRF), was evaluated with simulations as well as phantom and in vivo scans. We found that the AIR-MRF pipeline provided reduced parameter estimation errors compared to non-iterative and other iterative methods, particularly at shorter sequence lengths. Accelerated dictionary search methods incorporated into the iterative pipeline reduced the reconstruction time at little cost of quality. Copyright © 2017 Elsevier Inc. All rights reserved.

  12. Stereoselective virtual screening of the ZINC database using atom pair 3D-fingerprints.

    Science.gov (United States)

    Awale, Mahendra; Jin, Xian; Reymond, Jean-Louis

    2015-01-01

    Tools to explore large compound databases in search for analogs of query molecules provide a strategically important support in drug discovery to help identify available analogs of any given reference or hit compound by ligand based virtual screening (LBVS). We recently showed that large databases can be formatted for very fast searching with various 2D-fingerprints using the city-block distance as similarity measure, in particular a 2D-atom pair fingerprint (APfp) and the related category extended atom pair fingerprint (Xfp) which efficiently encode molecular shape and pharmacophores, but do not perceive stereochemistry. Here we investigated related 3D-atom pair fingerprints to enable rapid stereoselective searches in the ZINC database (23.2 million 3D structures). Molecular fingerprints counting atom pairs at increasing through-space distance intervals were designed using either all atoms (16-bit 3DAPfp) or different atom categories (80-bit 3DXfp). These 3D-fingerprints retrieved molecular shape and pharmacophore analogs (defined by OpenEye ROCS scoring functions) of 110,000 compounds from the Cambridge Structural Database with equal or better accuracy than the 2D-fingerprints APfp and Xfp, and showed comparable performance in recovering actives from decoys in the DUD database. LBVS by 3DXfp or 3DAPfp similarity was stereoselective and gave very different analogs when starting from different diastereomers of the same chiral drug. Results were also different from LBVS with the parent 2D-fingerprints Xfp or APfp. 3D- and 2D-fingerprints also gave very different results in LBVS of folded molecules where through-space distances between atom pairs are much shorter than topological distances. 3DAPfp and 3DXfp are suitable for stereoselective searches for shape and pharmacophore analogs of query molecules in large databases. Web-browsers for searching ZINC by 3DAPfp and 3DXfp similarity are accessible at www.gdb.unibe.ch and should provide useful assistance to drug

  13. Microporous silica prepared by organic templating: relationship between the molecular template and pore structure

    International Nuclear Information System (INIS)

    Brinker, C. Jeffrey; Cao, Guozhong; Kale, Rahul P.; Lopez, Gabriel P.; Lu, Yunfeng; Prabakar, S.

    1999-01-01

    Microporous silica materials with a controlled pore size and a narrow pore size distribution have been prepared by sol-gel processing using an organic-templating approach. Microporous networks were formed by pyrolytic removal of organic ligands (methacryloxypropyl groups) from organic/inorganic hybrid materials synthesized by copolymerization of 3-methacryloxypropylsilane (MPS) and tetraethoxysilane (TEOS). Molecular simulations and experimental measurements were conducted to examine the relationship between the microstructural characteristics of the porous silica (e.g., pore size, total pore volume, and pore connectivity) and the size and amount of organic template ligands added. Adsorption measurements suggest that the final porosity of the microporous silica is due to both primary pores (those present in the hybrid materials prior to pyrolysis) and secondary pores (those created by pyrolytic removal of organic templates). Primary pores were inaccessible to N(sub 2) at 77 K but accessible to CO(sub 2) at 195 K; secondary pores were accessible to both N(sub 2) (at 77 K) and CO(sub 2) (at 195 K) in adsorption measurements. Primary porosity decreases with the amount of organic ligands added because of the enhanced densification of MPS/TEOS hybrid materials as the mole fraction of trifunctional MPS moieties increases. pore volumes measured by nitrogen adsorption experiments at 77 K suggest that the secondary (template-derived) porosity exhibits a percolation behavior as the template concentration is increased. Gas permeation experiments indicate that the secondary pores are approximately 5(angstrom) in diameter, consistent with predictions based on molecular simulations

  14. A light meson translatable template

    International Nuclear Information System (INIS)

    Allgower, C.E.; Peaslee, D.C.

    2002-01-01

    Recently surveyed (mass)2 values for I = 0, JPC = 2++ light mesons can be assembled into repeating patterns of 4 states, dubbed 'templates'. Within error, both internal and external template spacings approximate simple multiples of Δm2 ≅ 0.35 GeV2. Hopefully, this feature will be useful in predicting the positions of higher isoscalar 2++ states

  15. Binary similarity measures for fingerprint analysis of qualitative metabolomic profiles.

    Science.gov (United States)

    Rácz, Anita; Andrić, Filip; Bajusz, Dávid; Héberger, Károly

    2018-01-01

    Contemporary metabolomic fingerprinting is based on multiple spectrometric and chromatographic signals, used either alone or combined with structural and chemical information of metabolic markers at the qualitative and semiquantitative level. However, signal shifting, convolution, and matrix effects may compromise metabolomic patterns. Recent increase in the use of qualitative metabolomic data, described by the presence (1) or absence (0) of particular metabolites, demonstrates great potential in the field of metabolomic profiling and fingerprint analysis. The aim of this study is a comprehensive evaluation of binary similarity measures for the elucidation of patterns among samples of different botanical origin and various metabolomic profiles. Nine qualitative metabolomic data sets covering a wide range of natural products and metabolomic profiles were applied to assess 44 binary similarity measures for the fingerprinting of plant extracts and natural products. The measures were analyzed by the novel sum of ranking differences method (SRD), searching for the most promising candidates. Baroni-Urbani-Buser (BUB) and Hawkins-Dotson (HD) similarity coefficients were selected as the best measures by SRD and analysis of variance (ANOVA), while Dice (Di1), Yule, Russel-Rao, and Consonni-Todeschini 3 ranked the worst. ANOVA revealed that concordantly and intermediately symmetric similarity coefficients are better candidates for metabolomic fingerprinting than the asymmetric and correlation based ones. The fingerprint analysis based on the BUB and HD coefficients and qualitative metabolomic data performed equally well as the quantitative metabolomic profile analysis. Fingerprint analysis based on the qualitative metabolomic profiles and binary similarity measures proved to be a reliable way in finding the same/similar patterns in metabolomic data as that extracted from quantitative data.

  16. Fingerprint-based structure retrieval using electron density.

    Science.gov (United States)

    Yin, Shuangye; Dokholyan, Nikolay V

    2011-03-01

    We present a computational approach that can quickly search a large protein structural database to identify structures that fit a given electron density, such as determined by cryo-electron microscopy. We use geometric invariants (fingerprints) constructed using 3D Zernike moments to describe the electron density, and reduce the problem of fitting of the structure to the electron density to simple fingerprint comparison. Using this approach, we are able to screen the entire Protein Data Bank and identify structures that fit two experimental electron densities determined by cryo-electron microscopy. Copyright © 2010 Wiley-Liss, Inc.

  17. Fingerprint extraction from interference destruction terahertz spectrum.

    Science.gov (United States)

    Xiong, Wei; Shen, Jingling

    2010-10-11

    In this paper, periodic peaks in a terahertz absorption spectrum are confirmed to be induced from interference effects. Theoretically, we explained the periodic peaks and calculated the locations of them. Accordingly, a technique was suggested, with which the interference peaks in a terahertz spectrum can be eliminated and therefore a real terahertz absorption spectrum can be obtained. Experimentally, a sample, Methamphetamine, was investigated and its terahertz fingerprint was successfully extracted from its interference destruction spectrum. This technique is useful in getting samples' terahertz fingerprint spectra, and furthermore provides a fast nondestructive testing method using a large size terahertz beam to identify materials.

  18. Algorithm comparison for schedule optimization in MR fingerprinting.

    Science.gov (United States)

    Cohen, Ouri; Rosen, Matthew S

    2017-09-01

    In MR Fingerprinting, the flip angles and repetition times are chosen according to a pseudorandom schedule. In previous work, we have shown that maximizing the discrimination between different tissue types by optimizing the acquisition schedule allows reductions in the number of measurements required. The ideal optimization algorithm for this application remains unknown, however. In this work we examine several different optimization algorithms to determine the one best suited for optimizing MR Fingerprinting acquisition schedules. Copyright © 2017 Elsevier Inc. All rights reserved.

  19. Chemical Fingerprint Analysis and Quantitative Analysis of Rosa rugosa by UPLC-DAD

    Directory of Open Access Journals (Sweden)

    Sanawar Mansur

    2016-12-01

    Full Text Available A method based on ultra performance liquid chromatography with a diode array detector (UPLC-DAD was developed for quantitative analysis of five active compounds and chemical fingerprint analysis of Rosa rugosa. Ten batches of R. rugosa collected from different plantations in the Xinjiang region of China were used to establish the fingerprint. The feasibility and advantages of the used UPLC fingerprint were verified for its similarity evaluation by systematically comparing chromatograms with professional analytical software recommended by State Food and Drug Administration (SFDA of China. In quantitative analysis, the five compounds showed good regression (R2 = 0.9995 within the test ranges, and the recovery of the method was in the range of 94.2%–103.8%. The similarities of liquid chromatography fingerprints of 10 batches of R. rugosa were more than 0.981. The developed UPLC fingerprint method is simple, reliable, and validated for the quality control and identification of R. rugosa. Additionally, simultaneous quantification of five major bioactive ingredients in the R. rugosa samples was conducted to interpret the consistency of the quality test. The results indicated that the UPLC fingerprint, as a characteristic distinguishing method combining similarity evaluation and quantification analysis, can be successfully used to assess the quality and to identify the authenticity of R. rugosa.

  20. Beware of the possibility of fingerprinting techniques transferring DNA.

    Science.gov (United States)

    van Oorschot, Roland A H; Treadwell, Sally; Beaurepaire, James; Holding, Nicole L; Mitchell, Robert J

    2005-11-01

    Fingerprinting brushes have the potential to collect and transfer DNA during powdering. Squirrel-hair fingerprint brushes exposed to specific sets of saliva stains and brushes used in routine casework were tested for their ability to collect and transfer DNA containing material using standard DNA extraction procedures and AmpFlSTR Profiler Plus amplification and typing procedures. The tests found that the risk of transferring DNA during powdering and having a detrimental impact on the analysis increases if the examiner powders over either biological stains (such as blood or saliva) or very fresh prints and uses more sensitive PCR amplification and typing procedures. We advocate caution when powdering prints from which DNA may also be collected and provide options for consideration to limit the risk of transferred DNA contamination while fingerprinting.

  1. Wavelet/scalar quantization compression standard for fingerprint images

    Energy Technology Data Exchange (ETDEWEB)

    Brislawn, C.M.

    1996-06-12

    US Federal Bureau of Investigation (FBI) has recently formulated a national standard for digitization and compression of gray-scale fingerprint images. Fingerprints are scanned at a spatial resolution of 500 dots per inch, with 8 bits of gray-scale resolution. The compression algorithm for the resulting digital images is based on adaptive uniform scalar quantization of a discrete wavelet transform subband decomposition (wavelet/scalar quantization method). The FBI standard produces archival-quality images at compression ratios of around 15 to 1 and will allow the current database of paper fingerprint cards to be replaced by digital imagery. The compression standard specifies a class of potential encoders and a universal decoder with sufficient generality to reconstruct compressed images produced by any compliant encoder, allowing flexibility for future improvements in encoder technology. A compliance testing program is also being implemented to ensure high standards of image quality and interchangeability of data between different implementations.

  2. Complexity and distortion analysis on methods for unrolling 3D to 2D fingerprints

    CSIR Research Space (South Africa)

    Mlambo, CS

    2015-11-01

    Full Text Available and studies involve the application of three-dimensional (3D) fingerprint systems, where the details of the finger are captured using 3D technologies and the captured 3D fingerprints are converted into two-dimensional (2D) fingerprints. This paper presents a...

  3. A joint FED watermarking system using spatial fusion for verifying the security issues of teleradiology.

    Science.gov (United States)

    Viswanathan, P; Krishna, P Venkata

    2014-05-01

    Teleradiology allows transmission of medical images for clinical data interpretation to provide improved e-health care access, delivery, and standards. The remote transmission raises various ethical and legal issues like image retention, fraud, privacy, malpractice liability, etc. A joint FED watermarking system means a joint fingerprint/encryption/dual watermarking system is proposed for addressing these issues. The system combines a region based substitution dual watermarking algorithm using spatial fusion, stream cipher algorithm using symmetric key, and fingerprint verification algorithm using invariants. This paper aims to give access to the outcomes of medical images with confidentiality, availability, integrity, and its origin. The watermarking, encryption, and fingerprint enrollment are conducted jointly in protection stage such that the extraction, decryption, and verification can be applied independently. The dual watermarking system, introducing two different embedding schemes, one used for patient data and other for fingerprint features, reduces the difficulty in maintenance of multiple documents like authentication data, personnel and diagnosis data, and medical images. The spatial fusion algorithm, which determines the region of embedding using threshold from the image to embed the encrypted patient data, follows the exact rules of fusion resulting in better quality than other fusion techniques. The four step stream cipher algorithm using symmetric key for encrypting the patient data with fingerprint verification system using algebraic invariants improves the robustness of the medical information. The experiment result of proposed scheme is evaluated for security and quality analysis in DICOM medical images resulted well in terms of attacks, quality index, and imperceptibility.

  4. Review of Research on Template Methods in Preparation of Nanomaterials

    Directory of Open Access Journals (Sweden)

    Yadian Xie

    2016-01-01

    Full Text Available The nanomaterials have been widely used in various fields, such as photonics, catalysis, and adsorption, because of their unique physical and chemical properties. Therefore, their production methods are of utmost importance. Compared with traditional synthetic methods, the template method can effectively control the morphology, particle size, and structure during the preparation of nanomaterials, which is an effective method for their synthesis. The key for the template method is to choose different templates, which are divided into hard template and soft template according to their different structures. In this paper, the effects of different types of templates on the morphology of nanomaterials during their preparation are investigated from two aspects: hard template and soft template, combined with the mechanism of action.

  5. High-speed biometrics ultrasonic system for 3D fingerprint imaging

    Science.gov (United States)

    Maev, Roman G.; Severin, Fedar

    2012-10-01

    The objective of this research is to develop a new robust fingerprint identification technology based upon forming surface-subsurface (under skin) ultrasonic 3D images of the finger pads. The presented work aims to create specialized ultrasonic scanning methods for biometric purposes. Preliminary research has demonstrated the applicability of acoustic microscopy for fingerprint reading. The additional information from internal skin layers and dermis structures contained in the scan can essentially improve confidence in the identification. Advantages of this system include high resolution and quick scanning time. Operating in pulse-echo mode provides spatial resolution up to 0.05 mm. Technology advantages of the proposed technology are the following: • Full-range scanning of the fingerprint area "nail to nail" (2.5 x 2.5 cm) can be done in less than 5 sec with a resolution of up to 1000 dpi. • Collection of information about the in-depth structure of the fingerprint realized by the set of spherically focused 50 MHz acoustic lens provide the resolution ~ 0.05 mm or better • In addition to fingerprints, this technology can identify sweat porous at the surface and under the skin • No sensitivity to the contamination of the finger's surface • Detection of blood velocity using Doppler effect can be implemented to distinguish living specimens • Utilization as polygraph device • Simple connectivity to fingerprint databases obtained with other techniques • The digitally interpolated images can then be enhanced allowing for greater resolution • Method can be applied to fingernails and underlying tissues, providing more information • A laboratory prototype of the biometrics system based on these described principles was designed, built and tested. It is the first step toward a practical implementation of this technique.

  6. Forensic Discrimination of Latent Fingerprints Using Laser-Induced Breakdown Spectroscopy (LIBS) and Chemometric Approaches.

    Science.gov (United States)

    Yang, Jun-Ho; Yoh, Jack J

    2018-01-01

    A novel technique is reported for separating overlapping latent fingerprints using chemometric approaches that combine laser-induced breakdown spectroscopy (LIBS) and multivariate analysis. The LIBS technique provides the capability of real time analysis and high frequency scanning as well as the data regarding the chemical composition of overlapping latent fingerprints. These spectra offer valuable information for the classification and reconstruction of overlapping latent fingerprints by implementing appropriate statistical multivariate analysis. The current study employs principal component analysis and partial least square methods for the classification of latent fingerprints from the LIBS spectra. This technique was successfully demonstrated through a classification study of four distinct latent fingerprints using classification methods such as soft independent modeling of class analogy (SIMCA) and partial least squares discriminant analysis (PLS-DA). The novel method yielded an accuracy of more than 85% and was proven to be sufficiently robust. Furthermore, through laser scanning analysis at a spatial interval of 125 µm, the overlapping fingerprints were reconstructed as separate two-dimensional forms.

  7. Template for safety reports with descriptive example

    International Nuclear Information System (INIS)

    1995-12-01

    This report provides a template for future safety reports on long-term safety in support of important decisions and permit applications in connection with the construction of a deep repository system. The template aims at providing a uniform structure for describing long-term safety, after the repository has been closed and sealed. The availability of such a structure will simplify both preparation and review of the safety reports, and make it possible to follow how safety assessments are influenced by the progressively more detailed body of data that emerges. A separate section containing 'descriptive examples' has been appended to the template. This section illustrates what the different chapters of the template should contain. 279 refs

  8. Template for safety reports with descriptive example

    Energy Technology Data Exchange (ETDEWEB)

    NONE

    1995-12-01

    This report provides a template for future safety reports on long-term safety in support of important decisions and permit applications in connection with the construction of a deep repository system. The template aims at providing a uniform structure for describing long-term safety, after the repository has been closed and sealed. The availability of such a structure will simplify both preparation and review of the safety reports, and make it possible to follow how safety assessments are influenced by the progressively more detailed body of data that emerges. A separate section containing `descriptive examples` has been appended to the template. This section illustrates what the different chapters of the template should contain. 279 refs.

  9. Analysis of fingerprint samples, testing various conditions, for forensic DNA identification.

    Science.gov (United States)

    Ostojic, Lana; Wurmbach, Elisa

    2017-01-01

    Fingerprints can be of tremendous value for forensic biology, since they can be collected from a wide variety of evident types, such as handles of weapons, tools collected in criminal cases, and objects with no apparent staining. DNA obtained from fingerprints varies greatly in quality and quantity, which ultimately affects the quality of the resulting STR profiles. Additional difficulties can arise when fingerprint samples show mixed STR profiles due to the handling of multiple persons. After applying a tested protocol for sample collection (swabbing with 5% Triton X-100), DNA extraction (using an enzyme that works at elevated temperatures), and PCR amplification (AmpFlSTR® Identifiler® using 31cycles) extensive analysis was performed to better understand the challenges inherent to fingerprint samples, with the ultimate goal of developing valuable profiles (≥50% complete). The impact of time on deposited fingerprints was investigated, revealing that while the quality of profiles deteriorated, full STR profiles could still be obtained from samples after 40days of storage at room temperature. By comparing the STR profiles from fingerprints of the dominant versus the non-dominant hand, we found a slightly better quality from the non-dominant hand, which was not always significant. Substrates seem to have greater effects on fingerprints. Tests on glass, plastic, paper and metal (US Quarter dollar, made of Cu and Ni), common substrates in offices and homes, showed best results for glass, followed by plastic and paper, while almost no profiles were obtained from a Quarter dollar. Important for forensic casework, we also assessed three-person mixtures of touched fingerprint samples. Unlike routinely used approaches for sampling evidence, the surface of an object (bottle) was sectioned into six equal parts and separate samples were taken from each section. The samples were processed separately for DNA extraction and STR amplification. The results included a few single

  10. Screening for templates that promote crystallization

    NARCIS (Netherlands)

    Urbanus, J.; Roelands, C.P.M.; Horst, J.H. ter; Verdoes, D.; Jansens, P.J.

    2008-01-01

    In Situ Product Recovery (ISPR) applied in fermentation processes leads to improved yield and productivity of these processes. In principle, ISPR can be achieved using Template Induced Crystallization (TIC), which is one possible ISPR technique. With TIC, templates are added to the solution as a

  11. A BAC clone fingerprinting approach to the detection of human genome rearrangements

    Science.gov (United States)

    Krzywinski, Martin; Bosdet, Ian; Mathewson, Carrie; Wye, Natasja; Brebner, Jay; Chiu, Readman; Corbett, Richard; Field, Matthew; Lee, Darlene; Pugh, Trevor; Volik, Stas; Siddiqui, Asim; Jones, Steven; Schein, Jacquie; Collins, Collin; Marra, Marco

    2007-01-01

    We present a method, called fingerprint profiling (FPP), that uses restriction digest fingerprints of bacterial artificial chromosome clones to detect and classify rearrangements in the human genome. The approach uses alignment of experimental fingerprint patterns to in silico digests of the sequence assembly and is capable of detecting micro-deletions (1-5 kb) and balanced rearrangements. Our method has compelling potential for use as a whole-genome method for the identification and characterization of human genome rearrangements. PMID:17953769

  12. Rate in template-directed polymer synthesis.

    Science.gov (United States)

    Saito, Takuya

    2014-06-01

    We discuss the temporal efficiency of template-directed polymer synthesis, such as DNA replication and transcription, under a given template string. To weigh the synthesis speed and accuracy on the same scale, we propose a template-directed synthesis (TDS) rate, which contains an expression analogous to that for the Shannon entropy. Increasing the synthesis speed accelerates the TDS rate, but the TDS rate is lowered if the produced sequences are diversified. We apply the TDS rate to some production system models and investigate how the balance between the speed and the accuracy is affected by changes in the system conditions.

  13. [Identification of a repetitive sequence element for DNA fingerprinting in Phytophthora sojae].

    Science.gov (United States)

    Yin, Lihua; Wang, Qinhu; Ning, Feng; Zhu, Xiaoying; Zuo, Yuhu; Shan, Weixing

    2010-04-01

    Establishment of DNA fingerprinting in Phytophthora sojae and an analysis of genetic relationship of Heilongjiang and Xinjiang populations. Bioinformatics tools were used to search repetitive sequences in P. sojae and Southern blot analysis was employed for DNA fingerprinting analysis of P. sojae populations from Heilongjiang and Xinjiang using the identified repetitive sequence. A moderately repetitive sequence was identified and designated as PS1227. Southern blot analysis indicated 34 distinct bands ranging in size from 1.5 kb-23 kb, of which 21 were polymorphic among 49 isolates examined. Analysis of single-zoospore progenies showed that the PS1227 fingerprint pattern was mitotically stable. DNA fingerprinting showed that the P. sojae isolates HP4002, SY6 and GJ0105 of Heilongjiang are genetically identical to DW303, 71228 and 71222 of Xinjiang, respectively. A moderately repetitive sequence designated PS1227 which will be useful for epidemiology and population biology studies of P. sojae was obtained, and a PS1227-based DNA fingerprinting analysis provided molecular evidence that P. sojae in Xinjiang was likely introduced from Heilongjiang.

  14. Cloning and Characterization of a Complex DNA Fingerprinting Probe for Candida parapsilosis

    Science.gov (United States)

    Enger, Lee; Joly, Sophie; Pujol, Claude; Simonson, Patricia; Pfaller, Michael; Soll, David R.

    2001-01-01

    Candida parapsilosis accounts for a significant number of nosocomial fungemias, but in fact, no effective and verified genetic fingerprinting method has emerged for assessing the relatedness of independent isolates for epidemiological studies. A complex 15-kb DNA fingerprinting probe, Cp3-13, was therefore isolated from a library of C. parapsilosis genomic DNA fragments. The efficacy of Cp3-13 for DNA fingerprinting was verified by a comparison of its clustering capacity with those of randomly amplified polymorphic DNA analysis and internally transcribed spacer region sequencing, by testing species specificity, and by assessing its capacity to identify microevolutionary changes both in vitro and in vivo. Southern blot hybridization of EcoRI/SalI-digested DNA with Cp3-13 provides a fingerprinting system that (i) identifies the same strain in independent isolates, (ii) discriminates between unrelated isolates, (iii) separates independent isolates into valid groups in a dendrogram, (iv) identifies microevolution in infecting populations, and (v) is amenable to automatic computer-assisted DNA fingerprint analysis. This probe is now available for epidemiological studies. PMID:11158125

  15. Examination of Speed Contribution of Parallelization for Several Fingerprint Pre-Processing Algorithms

    Directory of Open Access Journals (Sweden)

    GORGUNOGLU, S.

    2014-05-01

    Full Text Available In analysis of minutiae based fingerprint systems, fingerprints needs to be pre-processed. The pre-processing is carried out to enhance the quality of the fingerprint and to obtain more accurate minutiae points. Reducing the pre-processing time is important for identification and verification in real time systems and especially for databases holding large fingerprints information. Parallel processing and parallel CPU computing can be considered as distribution of processes over multi core processor. This is done by using parallel programming techniques. Reducing the execution time is the main objective in parallel processing. In this study, pre-processing of minutiae based fingerprint system is implemented by parallel processing on multi core computers using OpenMP and on graphics processor using CUDA to improve execution time. The execution times and speedup ratios are compared with the one that of single core processor. The results show that by using parallel processing, execution time is substantially improved. The improvement ratios obtained for different pre-processing algorithms allowed us to make suggestions on the more suitable approaches for parallelization.

  16. Fingerprint image enhancement by differential hysteresis processing.

    Science.gov (United States)

    Blotta, Eduardo; Moler, Emilce

    2004-05-10

    A new method to enhance defective fingerprints images through image digital processing tools is presented in this work. When the fingerprints have been taken without any care, blurred and in some cases mostly illegible, as in the case presented here, their classification and comparison becomes nearly impossible. A combination of spatial domain filters, including a technique called differential hysteresis processing (DHP), is applied to improve these kind of images. This set of filtering methods proved to be satisfactory in a wide range of cases by uncovering hidden details that helped to identify persons. Dactyloscopy experts from Policia Federal Argentina and the EAAF have validated these results.

  17. Development and assessment of microarray-based DNA fingerprinting in Eucalyptus grandis.

    Science.gov (United States)

    Lezar, Sabine; Myburg, A A; Berger, D K; Wingfield, M J; Wingfield, B D

    2004-11-01

    Development of improved Eucalyptus genotypes involves the routine identification of breeding stock and superior clones. Currently, microsatellites and random amplified polymorphic DNA markers are the most widely used DNA-based techniques for fingerprinting of these trees. While these techniques have provided rapid and powerful fingerprinting assays, they are constrained by their reliance on gel or capillary electrophoresis, and therefore, relatively low throughput of fragment analysis. In contrast, recently developed microarray technology holds the promise of parallel analysis of thousands of markers in plant genomes. The aim of this study was to develop a DNA fingerprinting chip for Eucalyptus grandis and to investigate its usefulness for fingerprinting of eucalypt trees. A prototype chip was prepared using a partial genomic library from total genomic DNA of 23 E. grandis trees, of which 22 were full siblings. A total of 384 cloned genomic fragments were individually amplified and arrayed onto glass slides. DNA fingerprints were obtained for 17 individuals by hybridizing labeled genome representations of the individual trees to the 384-element chip. Polymorphic DNA fragments were identified by evaluating the binary distribution of their background-corrected signal intensities across full-sib individuals. Among 384 DNA fragments on the chip, 104 (27%) were found to be polymorphic. Hybridization of these polymorphic fragments was highly repeatable (R2>0.91) within the E. grandis individuals, and they allowed us to identify all 17 full-sib individuals. Our results suggest that DNA microarrays can be used to effectively fingerprint large numbers of closely related Eucalyptus trees.

  18. Improving your target-template alignment with MODalign

    OpenAIRE

    Barbato, Alessandro; Benkert, Pascal; Schwede, Torsten; Tramontano, Anna; Kosinski, Jan

    2012-01-01

    Summary: MODalign is an interactive web-based tool aimed at helping protein structure modelers to inspect and manually modify the alignment between the sequences of a target protein and of its template(s). It interactively computes, displays and, upon modification of the target-template alignment, updates the multiple sequence alignments of the two protein families, their conservation score, secondary structure and solvent accessibility values, and local quality scores of the implied three-di...

  19. Carotenoids Database: structures, chemical fingerprints and distribution among organisms.

    Science.gov (United States)

    Yabuzaki, Junko

    2017-01-01

    To promote understanding of how organisms are related via carotenoids, either evolutionarily or symbiotically, or in food chains through natural histories, we built the Carotenoids Database. This provides chemical information on 1117 natural carotenoids with 683 source organisms. For extracting organisms closely related through the biosynthesis of carotenoids, we offer a new similarity search system 'Search similar carotenoids' using our original chemical fingerprint 'Carotenoid DB Chemical Fingerprints'. These Carotenoid DB Chemical Fingerprints describe the chemical substructure and the modification details based upon International Union of Pure and Applied Chemistry (IUPAC) semi-systematic names of the carotenoids. The fingerprints also allow (i) easier prediction of six biological functions of carotenoids: provitamin A, membrane stabilizers, odorous substances, allelochemicals, antiproliferative activity and reverse MDR activity against cancer cells, (ii) easier classification of carotenoid structures, (iii) partial and exact structure searching and (iv) easier extraction of structural isomers and stereoisomers. We believe this to be the first attempt to establish fingerprints using the IUPAC semi-systematic names. For extracting close profiled organisms, we provide a new tool 'Search similar profiled organisms'. Our current statistics show some insights into natural history: carotenoids seem to have been spread largely by bacteria, as they produce C30, C40, C45 and C50 carotenoids, with the widest range of end groups, and they share a small portion of C40 carotenoids with eukaryotes. Archaea share an even smaller portion with eukaryotes. Eukaryotes then have evolved a considerable variety of C40 carotenoids. Considering carotenoids, eukaryotes seem more closely related to bacteria than to archaea aside from 16S rRNA lineage analysis. : http://carotenoiddb.jp. © The Author(s) 2017. Published by Oxford University Press.

  20. A simple low cost latent fingerprint sensor based on deflectometry and WFT analysis

    Science.gov (United States)

    Dhanotia, Jitendra; Chatterjee, Amit; Bhatia, Vimal; Prakash, Shashi

    2018-02-01

    In criminal investigations, latent fingerprints are one of the most significant forms of evidence and most commonly used forensic investigation tool worldwide. The existing non-contact latent fingerprint detection systems are bulky, expensive and require environment which is shock and vibration resistant, thereby limiting their usability outside the laboratory. In this article, a compact, full field, low cost technique for profiling of fingerprints using deflectometry is proposed. Using inexpensive mobile phone screen based structured illumination, and windowed Fourier transform (WFT) based phase retrieval mechanism, the 2D and 3D phase plots reconstruct the profile information of the fingerprint. The phase information is also used to confirm a match between two fingerprints in real time. Since the proposed technique is non-interferometric, the measurements are least affected by environmental perturbations. Using the proposed technique, a portable sensor capable of field deployment has been realized.

  1. Generating One Biometric Feature from Another: Faces from Fingerprints

    Directory of Open Access Journals (Sweden)

    Seref Sagiroglu

    2010-04-01

    Full Text Available This study presents a new approach based on artificial neural networks for generating one biometric feature (faces from another (only fingerprints. An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces.

  2. Laser mass spectrometry for DNA fingerprinting for forensic applications

    Science.gov (United States)

    Chen, C. H. Winston; Tang, Kai; Taranenko, N. I.; Allman, S. L.; Ch'ang, L. Y.

    1994-10-01

    The application of DNA fingerprinting has become very broad in forensic analysis, patient identification, diagnostic medicine, and wildlife poaching, since every individual's DNA structure is identical within all tissues oftheir body. DNA fingerprinting was initiated by the use of restriction fragment length polymorphisms (RFLP). In 1987, Nakamura et aL2 found that a variable number of tandem repeats (VNTR) often occurred in the alleles. The probability of different individuals having the same number of tandem repeats in several different alleles is very low. Thus, the identification of VNTR from genomic DNA became a very reliable method for identification of individuals. Take the Huntington gene as an example, there are CAG trinucleotide repeats. For normal people, the number of CAG repeats is usually between 10 and 40. Since people have chromosomes in pairs, the possibility oftwo individuals having the same VNTR in the Huntington gene is less than one percent, ifwe assume equal distribution for various repeats. When several allels containing VNTR are analyzed for the number of repeats, the possibility of two individuals being exactly identical becomes very unlikely. Thus, DNA fingerprinting is a reliable tool for forensic analysis. In DNA fingerprinting, knowledge of the sequence of tandem repeats and restriction endornuclease sites can provide the basis for identification.

  3. CSI Frequency Domain Fingerprint-Based Passive Indoor Human Detection

    Directory of Open Access Journals (Sweden)

    Chong Han

    2018-04-01

    Full Text Available Passive indoor personnel detection technology is now a hot topic. Existing methods have been greatly influenced by environmental changes, and there are problems with the accuracy and robustness of detection. Passive personnel detection based on Wi-Fi not only solves the above problems, but also has the advantages of being low cost and easy to implement, and can be better applied to elderly care and safety monitoring. In this paper, we propose a passive indoor personnel detection method based on Wi-Fi, which we call FDF-PIHD (Frequency Domain Fingerprint-based Passive Indoor Human Detection. Through this method, fine-grained physical layer Channel State Information (CSI can be extracted to generate feature fingerprints so as to help determine the state in the scene by matching online fingerprints with offline fingerprints. In order to improve accuracy, we combine the detection results of three receiving antennas to obtain the final test result. The experimental results show that the detection rates of our proposed scheme all reach above 90%, no matter whether the scene is human-free, stationary or a moving human presence. In addition, it can not only detect whether there is a target indoors, but also determine the current state of the target.

  4. Generating One Biometric Feature from Another: Faces from Fingerprints

    Science.gov (United States)

    Ozkaya, Necla; Sagiroglu, Seref

    2010-01-01

    This study presents a new approach based on artificial neural networks for generating one biometric feature (faces) from another (only fingerprints). An automatic and intelligent system was designed and developed to analyze the relationships among fingerprints and faces and also to model and to improve the existence of the relationships. The new proposed system is the first study that generates all parts of the face including eyebrows, eyes, nose, mouth, ears and face border from only fingerprints. It is also unique and different from similar studies recently presented in the literature with some superior features. The parameter settings of the system were achieved with the help of Taguchi experimental design technique. The performance and accuracy of the system have been evaluated with 10-fold cross validation technique using qualitative evaluation metrics in addition to the expanded quantitative evaluation metrics. Consequently, the results were presented on the basis of the combination of these objective and subjective metrics for illustrating the qualitative properties of the proposed methods as well as a quantitative evaluation of their performances. Experimental results have shown that one biometric feature can be determined from another. These results have once more indicated that there is a strong relationship between fingerprints and faces. PMID:22399877

  5. Fingerprint pattern classification approach based on the coordinate geometry of singularities

    CSIR Research Space (South Africa)

    Msiza, IS

    2009-10-01

    Full Text Available of fingerprint matching, it serves to reduce the duration of the query. The fingerprint classes discussed in this document are the Central Twins (CT), Tented Arch (TA), Left Loop (LL), Right Loop (RL) and the Plain Arch (PA). The classification rules employed...

  6. Template analysis for the MAGIC telescopes

    Energy Technology Data Exchange (ETDEWEB)

    Menzel, Uta [Max-Planck-Institut fuer Physik, Muenchen (Germany); Collaboration: MAGIC-Collaboration

    2016-07-01

    The MAGIC telescopes are two 17-m-diameter Imaging Air Cherenkov Telescopes located on the Canary island of La Palma. They record the Cherenkov light from air showers induced by very high energy photons. The current data analysis uses a parametrization of the two shower images (including Hillas parameters) to determine the characteristics of the primary particle. I am implementing an advanced analysis method that compares shower images on a pixel basis with template images based on Monte Carlo simulations. To reduce the simulation effort the templates contain only pure shower images that are convolved with the telescope response later in the analysis. The primary particle parameters are reconstructed by maximizing the likelihood of the template. By using all the information available in the shower images, the performance of MAGIC is expected to improve. In this presentation I will explain the general idea of a template-based analysis and show the first results of the implementation.

  7. Sex differences in fingerprint ridge density in a Turkish young adult population: a sample of Baskent University.

    Science.gov (United States)

    Oktem, Hale; Kurkcuoglu, Ayla; Pelin, Ismail Can; Yazici, Ayse Canan; Aktaş, Gulnihal; Altunay, Fikret

    2015-05-01

    Fingerprints are considered to be one of the most reliable methods of identification. Identification of an individual plays a vital part of any medico-legal investigations. Dermatoglyphics is a branch of science that studies epidermal ridges and ridge patterns. Epidermal ridges are polygenic characteristics that form intrauterine 10-18 weeks and considered fully developed by the sixth month of fetal growth. Fingerprints are permanent morphological characteristics and criminal detection based on fingerprints is based on the principle that no two people can have identical fingerprints. Sex determination from fingerprints has been examined in different population. In this study we aimed to study fingerprint ridge density in Turkish population sample of Baskent University students. Fingerprints were obtained from 118 women, 88 men a total of 206 students aged between 17 and 28 years old by means of simple inking method. Fingerprints from all right and left hands fingers were collected in three different area of each. The ridges on fingerprints were counted diagonally on squares measuring 5 mm × 5 mm on radial, ulnar and inferior areas. The fingerprint ridge density in radial, ulnar and inferior areas and between sexes was compared statistically Mann Whitney U test and Friedman test. The ridge density was significantly greater in women in every region studied and in all fingers when compared to men. The fingerprint ridge density in the ulnar and radial areas of the fingerprints was significantly greater than the lower area. Fingerprint ridge density can be used by medico-legal examination for sex identification. Copyright © 2015 Elsevier Ltd and Faculty of Forensic and Legal Medicine. All rights reserved.

  8. DWI-based neural fingerprinting technology: a preliminary study on stroke analysis.

    Science.gov (United States)

    Ye, Chenfei; Ma, Heather Ting; Wu, Jun; Yang, Pengfei; Chen, Xuhui; Yang, Zhengyi; Ma, Jingbo

    2014-01-01

    Stroke is a common neural disorder in neurology clinics. Magnetic resonance imaging (MRI) has become an important tool to assess the neural physiological changes under stroke, such as diffusion weighted imaging (DWI) and diffusion tensor imaging (DTI). Quantitative analysis of MRI images would help medical doctors to localize the stroke area in the diagnosis in terms of structural information and physiological characterization. However, current quantitative approaches can only provide localization of the disorder rather than measure physiological variation of subtypes of ischemic stroke. In the current study, we hypothesize that each kind of neural disorder would have its unique physiological characteristics, which could be reflected by DWI images on different gradients. Based on this hypothesis, a DWI-based neural fingerprinting technology was proposed to classify subtypes of ischemic stroke. The neural fingerprint was constructed by the signal intensity of the region of interest (ROI) on the DWI images under different gradients. The fingerprint derived from the manually drawn ROI could classify the subtypes with accuracy 100%. However, the classification accuracy was worse when using semiautomatic and automatic method in ROI segmentation. The preliminary results showed promising potential of DWI-based neural fingerprinting technology in stroke subtype classification. Further studies will be carried out for enhancing the fingerprinting accuracy and its application in other clinical practices.

  9. Motif-role-fingerprints: the building-blocks of motifs, clustering-coefficients and transitivities in directed networks.

    Directory of Open Access Journals (Sweden)

    Mark D McDonnell

    Full Text Available Complex networks are frequently characterized by metrics for which particular subgraphs are counted. One statistic from this category, which we refer to as motif-role fingerprints, differs from global subgraph counts in that the number of subgraphs in which each node participates is counted. As with global subgraph counts, it can be important to distinguish between motif-role fingerprints that are 'structural' (induced subgraphs and 'functional' (partial subgraphs. Here we show mathematically that a vector of all functional motif-role fingerprints can readily be obtained from an arbitrary directed adjacency matrix, and then converted to structural motif-role fingerprints by multiplying that vector by a specific invertible conversion matrix. This result demonstrates that a unique structural motif-role fingerprint exists for any given functional motif-role fingerprint. We demonstrate a similar result for the cases of functional and structural motif-fingerprints without node roles, and global subgraph counts that form the basis of standard motif analysis. We also explicitly highlight that motif-role fingerprints are elemental to several popular metrics for quantifying the subgraph structure of directed complex networks, including motif distributions, directed clustering coefficient, and transitivity. The relationships between each of these metrics and motif-role fingerprints also suggest new subtypes of directed clustering coefficients and transitivities. Our results have potential utility in analyzing directed synaptic networks constructed from neuronal connectome data, such as in terms of centrality. Other potential applications include anomaly detection in networks, identification of similar networks and identification of similar nodes within networks. Matlab code for calculating all stated metrics following calculation of functional motif-role fingerprints is provided as S1 Matlab File.

  10. Traceability and Quality Control in Traditional Chinese Medicine: From Chemical Fingerprint to Two-Dimensional Barcode

    Directory of Open Access Journals (Sweden)

    Yong Cai

    2015-01-01

    Full Text Available Chemical fingerprinting is currently a widely used tool that enables rapid and accurate quality evaluation of Traditional Chinese Medicine (TCM. However, chemical fingerprints are not amenable to information storage, recognition, and retrieval, which limit their use in Chinese medicine traceability. In this study, samples of three kinds of Chinese medicines were randomly selected and chemical fingerprints were then constructed by using high performance liquid chromatography. Based on chemical data, the process of converting the TCM chemical fingerprint into two-dimensional code is presented; preprocess and filtering algorithm are also proposed aiming at standardizing the large amount of original raw data. In order to know which type of two-dimensional code (2D is suitable for storing data of chemical fingerprints, current popular types of 2D codes are analyzed and compared. Results show that QR Code is suitable for recording the TCM chemical fingerprint. The fingerprint information of TCM can be converted into data format that can be stored as 2D code for traceability and quality control.

  11. Graphene Emerges as a Versatile Template for Materials Preparation.

    Science.gov (United States)

    Li, Zhengjie; Wu, Sida; Lv, Wei; Shao, Jiao-Jing; Kang, Feiyu; Yang, Quan-Hong

    2016-05-01

    Graphene and its derivatives are emerging as a class of novel but versatile templates for the controlled preparation and functionalization of materials. In this paper a conceptual review on graphene-based templates is given, highlighting their versatile roles in materials preparation. Graphene is capable of acting as a low-dimensional hard template, where its two-dimensional morphology directs the formation of novel nanostructures. Graphene oxide and other functionalized graphenes are amphiphilic and may be seen as soft templates for formatting the growth or inducing the controlled assembly of nanostructures. In addition, nanospaces in restacked graphene can be used for confining the growth of sheet-like nanostructures, and assemblies of interlinked graphenes can behave either as skeletons for the formation of composite materials or as sacrificial templates for novel materials with a controlled network structure. In summary, flexible graphene and its derivatives together with an increasing number of assembled structures show great potentials as templates for materials production. Many challenges remain, for example precise structural control of such novel templates and the removal of the non-functional remaining templates. © 2016 WILEY-VCH Verlag GmbH & Co. KGaA, Weinheim.

  12. Image encryption using fingerprint as key based on phase retrieval algorithm and public key cryptography

    Science.gov (United States)

    Zhao, Tieyu; Ran, Qiwen; Yuan, Lin; Chi, Yingying; Ma, Jing

    2015-09-01

    In this paper, a novel image encryption system with fingerprint used as a secret key is proposed based on the phase retrieval algorithm and RSA public key algorithm. In the system, the encryption keys include the fingerprint and the public key of RSA algorithm, while the decryption keys are the fingerprint and the private key of RSA algorithm. If the users share the fingerprint, then the system will meet the basic agreement of asymmetric cryptography. The system is also applicable for the information authentication. The fingerprint as secret key is used in both the encryption and decryption processes so that the receiver can identify the authenticity of the ciphertext by using the fingerprint in decryption process. Finally, the simulation results show the validity of the encryption scheme and the high robustness against attacks based on the phase retrieval technique.

  13. Speed-up Template Matching through Integral Image based Weak Classifiers

    NARCIS (Netherlands)

    Wu, t.; Toet, A.

    2014-01-01

    Template matching is a widely used pattern recognition method, especially in industrial inspection. However, the computational costs of traditional template matching increase dramatically with both template-and scene imagesize. This makes traditional template matching less useful for many (e.g.

  14. Soil-gas diffusivity fingerprints of the dual porosity system in fractured limestone

    DEFF Research Database (Denmark)

    Claes, Niels; Chamindu, D.T.K.K.; Jensen, Jacob Birk

    2010-01-01

    processes are mostly limited to hydrogeological (water and solute) transport studies with very poor attention to the gaseous phase transport studies (Kristensen et al. 2010). This study characterizes fractured limestone soils for gas diffusion based on three different gas diffusivity fingerprints. The first...... fingerprint is a two-parameter exponential model, which mainly describes the gas diffusivity in the limestone matrix while taking both fracture connectivity and matrix pore connectivity into account. With the second fingerprint, we make a close observation of the tortuous matrix pore network by means...... of a modified Buckingham (1904) pore connectivity factor (X*). The third fingerprint of the fracture network involves the average angle of diffusion α (Moldrup et al. 2010), a parameter which characterizes the average angle at which the fractures are penetrating the sample....

  15. [Study on the fingerprint of Morus alba from different habitats by HPLC].

    Science.gov (United States)

    Chen, Cheng; Li, Hong-Bo; Wang, Liu-Ping; Li, Yun-Rong; Xin, Ning

    2012-12-01

    To establish HPLC fingerprint of Morus alba from different habitats by HPLC and provide basis for its quality control. HPLC analysis was performed on an Agilent XDB C18 Column (4.6 mm x 250 mm, 5 microm), gradient eluted composed of acetonitrile and 0.3% phosphate acid. The column temperature was set at 35 degrees C and the flow rate was 0.5 mL/min. The detective wavelength was 290 nm. The HPLC fingerprint for 10 batches of Morus alba was studied on their similarity. There were twelve common peaks in the fingerprint. The similarity of 7 batches was above 0.9 and the other batches had low similarity. The HPLC fingerprint can be used for quality control of Morus alba with high characteristics and specificity.

  16. Chemical Visualization of Sweat Pores in Fingerprints Using GO-Enhanced TOF-SIMS.

    Science.gov (United States)

    Cai, Lesi; Xia, Meng-Chan; Wang, Zhaoying; Zhao, Ya-Bin; Li, Zhanping; Zhang, Sichun; Zhang, Xinrong

    2017-08-15

    Time-of-flight secondary ion mass spectrometry (TOF-SIMS) has been used in imaging of small molecules (SIMS was used to detect and image relatively high mass molecules such as poison, alkaloids (>600 Da) and controlled drugs, and antibiotics (>700 Da) in fingerprints. Detail features of fingerprints such as the number and distribution of sweat pores in a ridge and even the delicate morphology of one pore were clearly revealed in SIMS images of relatively high mass molecules. The detail features combining with identified chemical composition were sufficient to establish a human identity and link the suspect to a crime scene. The wide detectable mass range and high spatial resolution make GO-enhanced TOF-SIMS a promising tool in accurate and fast analysis of fingerprints, especially in fragmental fingerprint analysis.

  17. Similarity analyses of chromatographic herbal fingerprints: A review

    International Nuclear Information System (INIS)

    Goodarzi, Mohammad; Russell, Paul J.; Vander Heyden, Yvan

    2013-01-01

    Graphical abstract: -- Highlights: •Similarity analyses of herbal fingerprints are reviewed. •Different (dis)similarity approaches are discussed. •(Dis)similarity-metrics and exploratory-analysis approaches are illustrated. •Correlation and distance-based measures are overviewed. •Similarity analyses illustrated by several case studies. -- Abstract: Herbal medicines are becoming again more popular in the developed countries because being “natural” and people thus often assume that they are inherently safe. Herbs have also been used worldwide for many centuries in the traditional medicines. The concern of their safety and efficacy has grown since increasing western interest. Herbal materials and their extracts are very complex, often including hundreds of compounds. A thorough understanding of their chemical composition is essential for conducting a safety risk assessment. However, herbal material can show considerable variability. The chemical constituents and their amounts in a herb can be different, due to growing conditions, such as climate and soil, the drying process, the harvest season, etc. Among the analytical methods, chromatographic fingerprinting has been recommended as a potential and reliable methodology for the identification and quality control of herbal medicines. Identification is needed to avoid fraud and adulteration. Currently, analyzing chromatographic herbal fingerprint data sets has become one of the most applied tools in quality assessment of herbal materials. Mostly, the entire chromatographic profiles are used to identify or to evaluate the quality of the herbs investigated. Occasionally only a limited number of compounds are considered. One approach to the safety risk assessment is to determine whether the herbal material is substantially equivalent to that which is either readily consumed in the diet, has a history of application or has earlier been commercialized i.e. to what is considered as reference material. In order

  18. Similarity analyses of chromatographic herbal fingerprints: A review

    Energy Technology Data Exchange (ETDEWEB)

    Goodarzi, Mohammad [Department of Analytical Chemistry and Pharmaceutical Technology, Center for Pharmaceutical Research, Vrije Universiteit Brussel, Laarbeeklaan 103, B-1090 Brussels (Belgium); Russell, Paul J. [Safety and Environmental Assurance Centre, Unilever, Colworth Science Park, Sharnbrook, Bedfordshire MK44 1LQ (United Kingdom); Vander Heyden, Yvan, E-mail: yvanvdh@vub.ac.be [Department of Analytical Chemistry and Pharmaceutical Technology, Center for Pharmaceutical Research, Vrije Universiteit Brussel, Laarbeeklaan 103, B-1090 Brussels (Belgium)

    2013-12-04

    Graphical abstract: -- Highlights: •Similarity analyses of herbal fingerprints are reviewed. •Different (dis)similarity approaches are discussed. •(Dis)similarity-metrics and exploratory-analysis approaches are illustrated. •Correlation and distance-based measures are overviewed. •Similarity analyses illustrated by several case studies. -- Abstract: Herbal medicines are becoming again more popular in the developed countries because being “natural” and people thus often assume that they are inherently safe. Herbs have also been used worldwide for many centuries in the traditional medicines. The concern of their safety and efficacy has grown since increasing western interest. Herbal materials and their extracts are very complex, often including hundreds of compounds. A thorough understanding of their chemical composition is essential for conducting a safety risk assessment. However, herbal material can show considerable variability. The chemical constituents and their amounts in a herb can be different, due to growing conditions, such as climate and soil, the drying process, the harvest season, etc. Among the analytical methods, chromatographic fingerprinting has been recommended as a potential and reliable methodology for the identification and quality control of herbal medicines. Identification is needed to avoid fraud and adulteration. Currently, analyzing chromatographic herbal fingerprint data sets has become one of the most applied tools in quality assessment of herbal materials. Mostly, the entire chromatographic profiles are used to identify or to evaluate the quality of the herbs investigated. Occasionally only a limited number of compounds are considered. One approach to the safety risk assessment is to determine whether the herbal material is substantially equivalent to that which is either readily consumed in the diet, has a history of application or has earlier been commercialized i.e. to what is considered as reference material. In order

  19. Converting Panax ginseng DNA and chemical fingerprints into two-dimensional barcode.

    Science.gov (United States)

    Cai, Yong; Li, Peng; Li, Xi-Wen; Zhao, Jing; Chen, Hai; Yang, Qing; Hu, Hao

    2017-07-01

    In this study, we investigated how to convert the Panax ginseng DNA sequence code and chemical fingerprints into a two-dimensional code. In order to improve the compression efficiency, GATC2Bytes and digital merger compression algorithms are proposed. HPLC chemical fingerprint data of 10 groups of P. ginseng from Northeast China and the internal transcribed spacer 2 (ITS2) sequence code as the DNA sequence code were ready for conversion. In order to convert such data into a two-dimensional code, the following six steps were performed: First, the chemical fingerprint characteristic data sets were obtained through the inflection filtering algorithm. Second, precompression processing of such data sets is undertaken. Third, precompression processing was undertaken with the P. ginseng DNA (ITS2) sequence codes. Fourth, the precompressed chemical fingerprint data and the DNA (ITS2) sequence code were combined in accordance with the set data format. Such combined data can be compressed by Zlib, an open source data compression algorithm. Finally, the compressed data generated a two-dimensional code called a quick response code (QR code). Through the abovementioned converting process, it can be found that the number of bytes needed for storing P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can be greatly reduced. After GTCA2Bytes algorithm processing, the ITS2 compression rate reaches 75% and the chemical fingerprint compression rate exceeds 99.65% via filtration and digital merger compression algorithm processing. Therefore, the overall compression ratio even exceeds 99.36%. The capacity of the formed QR code is around 0.5k, which can easily and successfully be read and identified by any smartphone. P. ginseng chemical fingerprints and its DNA (ITS2) sequence code can form a QR code after data processing, and therefore the QR code can be a perfect carrier of the authenticity and quality of P. ginseng information. This study provides a theoretical

  20. Identity based Encryption and Biometric Authentication Scheme for Secure Data Access in Cloud Computing

    DEFF Research Database (Denmark)

    Cheng, Hongbing; Rong, Chunming; Tan, Zheng-Hua

    2012-01-01

    Cloud computing will be a main information infrastructure in the future; it consists of many large datacenters which are usually geographically distributed and heterogeneous. How to design a secure data access for cloud computing platform is a big challenge. In this paper, we propose a secure data...... access scheme based on identity-based encryption and biometric authentication for cloud computing. Firstly, we describe the security concern of cloud computing and then propose an integrated data access scheme for cloud computing, the procedure of the proposed scheme include parameter setup, key...... distribution, feature template creation, cloud data processing and secure data access control. Finally, we compare the proposed scheme with other schemes through comprehensive analysis and simulation. The results show that the proposed data access scheme is feasible and secure for cloud computing....

  1. [An analysis of the DNA fingerprinting of intestinal flora in inflammatory bowel disease].

    Science.gov (United States)

    Li, Run-mei; Han, Ying; Wang, Ji-heng; Wang, Zhi-hong

    2007-02-01

    DNA fingerprinting for inflammatory bowel disease (IBD) patients and healthy subjects was carried out to compare the difference of intestinal flora between the two groups. DNA fingerprinting for IBD patients and healthy persons was set up with enterobacterial repetitive intergenic consensus (ERIC-PCR) technology and the difference of intestinal flora between the two groups compared. DNA fingerprinting of the IBD patients and healthy subjects was identified and a significant difference was noticed between them. There were lots of bands in the DNA fingerprinting of the healthy subjects but few in that of the IBD patients. Strikingly, same distribution of the principal band of DNA fingerprinting was noticed in IBD patients. The variety of intestinal flora in healthy subjects is more apparent than that in IBD patients. An unique principal band might be the sequence of the presence of specific etiopathogenetic bacterium, or it might be the combined sequence of mixed bacterial flora.

  2. In Silico Genomic Fingerprints of the Bacillus anthracis Group Obtained by Virtual Hybridization

    Directory of Open Access Journals (Sweden)

    Hueman Jaimes-Díaz

    2015-02-01

    Full Text Available In this study we evaluate the capacity of Virtual Hybridization to identify between highly related bacterial strains. Eight genomic fingerprints were obtained by virtual hybridization for the Bacillus anthracis genome set, and a set of 15,264 13-nucleotide short probes designed to produce genomic fingerprints unique for each organism. The data obtained from each genomic fingerprint were used to obtain hybridization patterns simulating a DNA microarray. Two virtual hybridization methods were used: the Direct and the Extended method to identify the number of potential hybridization sites and thus determine the minimum sensitivity value to discriminate between genomes with 99.9% similarity. Genomic fingerprints were compared using both methods and phylogenomic trees were constructed to verify that the minimum detection value is 0.000017. Results obtained from the genomic fingerprints suggest that the distribution in the trees is correct, as compared to other taxonomic methods. Specific virtual hybridization sites for each of the genomes studied were also identified.

  3. High perfomance liquid chromatography fingerprint analysis for quality control of brotowali (Tinospora crispa)

    Science.gov (United States)

    Syarifah, V. B.; Rafi, M.; Wahyuni, W. T.

    2017-05-01

    Brotowali (Tinospora crispa) is widely used in Indonesia as ingredient of herbal medicine formulation. To ensure the quality, safety, and efficacy of herbal medicine products, its chemical constituents should be continuously evaluated. High performance liquid chromatography (HPLC) fingerprint is one of powerful technique for this quality control process. In this study, HPLC fingerprint analysis method was developed for quality control of brotowali. HPLC analysis was performed in C18 column and detection was performed using photodiode array detector. The optimum mobile phase for brotowali fingerprint was acetonitrile (ACN) and 0.1% formic acid in gradient elution mode at a flow rate of 1 mL/min. The number of peaks detected in HPLC fingerprint of brotowali was 32 peaks and 23 peaks for stems and leaves, respectively. Berberine as marker compound was detected at retention time of 20.525 minutes. Evaluation of analytical performance including precision, reproducibility, and stability prove that this HPLC fingerprint analysis was reliable and could be applied for quality control of brotowali.

  4. Combining Biometric Fractal Pattern and Particle Swarm Optimization-Based Classifier for Fingerprint Recognition

    Directory of Open Access Journals (Sweden)

    Chia-Hung Lin

    2010-01-01

    Full Text Available This paper proposes combining the biometric fractal pattern and particle swarm optimization (PSO-based classifier for fingerprint recognition. Fingerprints have arch, loop, whorl, and accidental morphologies, and embed singular points, resulting in the establishment of fingerprint individuality. An automatic fingerprint identification system consists of two stages: digital image processing (DIP and pattern recognition. DIP is used to convert to binary images, refine out noise, and locate the reference point. For binary images, Katz's algorithm is employed to estimate the fractal dimension (FD from a two-dimensional (2D image. Biometric features are extracted as fractal patterns using different FDs. Probabilistic neural network (PNN as a classifier performs to compare the fractal patterns among the small-scale database. A PSO algorithm is used to tune the optimal parameters and heighten the accuracy. For 30 subjects in the laboratory, the proposed classifier demonstrates greater efficiency and higher accuracy in fingerprint recognition.

  5. Synthesis of Hybrid Conducting Nanowire Using AAO Template

    Science.gov (United States)

    2006-09-28

    oxide and alujminum oxide in anodized aluminum oxide ( AAO ) template with various aspect ratio and...than 3 nm. 2. Experimentals Anodized aluminum oxide ( AAO ) template was prepared from 99.999% purity aluminum foil by performing the following...to prepare uniform dimension of nanomaterials is to use anodized alumina membrane as template. The work emphasized self-organized arrangement of

  6. Making Deformable Template Models Operational

    DEFF Research Database (Denmark)

    Fisker, Rune

    2000-01-01

    for estimation of the model parameters, which applies a combination of a maximum likelihood and minimum distance criterion. Another contribution is a very fast search based initialization algorithm using a filter interpretation of the likelihood model. These two methods can be applied to most deformable template......Deformable template models are a very popular and powerful tool within the field of image processing and computer vision. This thesis treats this type of models extensively with special focus on handling their common difficulties, i.e. model parameter selection, initialization and optimization....... A proper handling of the common difficulties is essential for making the models operational by a non-expert user, which is a requirement for intensifying and commercializing the use of deformable template models. The thesis is organized as a collection of the most important articles, which has been...

  7. Biometric Fingerprint System to Enable Rapid and Accurate Identification of Beneficiaries

    OpenAIRE

    Storisteanu, Daniel Matthew L; Norman, Toby L; Grigore, Alexandra; Norman, Tristram L

    2015-01-01

    Inability to uniquely identify clients impedes access to services and contributes to inefficiencies. Using a pocket-sized fingerprint scanner that wirelessly syncs with a health worker's smartphone, the SimPrints biometric system can link individuals' fingerprints to their health records. A pilot in Bangladesh will assess its potential.

  8. Perancangan Aplikasi Presensi Dosen Realtime Dengan Metode Rapid Application Development (RAD Menggunakan Fingerprint Berbasis Web

    Directory of Open Access Journals (Sweden)

    Darma Setiawan Putra

    2018-05-01

    Full Text Available The fingerprint is one of the biometric methods which is can be used in the education field. Attendance monitoring system using fingerprint will make the leaders easily to monitor the attendance of the lecturer and to make decisions. The fingerprint attendance is used to easy students detecting quickly and accurately the lecturer in the classroom. This system aims to provide the lecturer status information, entry or exit for teaching when every lecturer performs a fingerprint scanning. This study uses rapid application development (RAD method to develop attendance system and involves the lecturer who have a teaching schedule in the current semester. To test the system, the lecturer was required to record the fingerprint in fingerprint machine. The result shows that the application of lecturer attendance in real time web-based can be a system provides the lecturers attendance information effectively and efficiently.

  9. Fingerprint detection on counterfeit US dollar banknotes: the importance of preliminary paper examination.

    Science.gov (United States)

    Azoury, Myriam; Cohen, Drorit; Himberg, Kimmo; Qvintus-Leino, Pia; Saari, Terhi; Almog, Joseph

    2004-09-01

    Two seizures of counterfeit 100 US dollar bills related to the same indicative number were submitted for processing of latent fingerprints. On one group of notes, identifiable fingerprints could be detected by the routine application of amino acid reagents. In the second case, this technique gave no results, even on deliberately deposited prints. Fingerprints could be revealed, however, by cyanoacrylate fuming followed by magnetic powder. Comprehensive paper analysis showed that banknotes from both seizures differed remarkably by chemical composition as well as paper macroscopic properties. The difference in surface free energy (related to surface tension) of the banknotes in the two groups seemed to be the major factor responsible for the great variance in fingerprint detectability.

  10. Provenancing Flower Bulbs by Analytical Fingerprinting: Convallaria Majalis

    Directory of Open Access Journals (Sweden)

    Saskia M. van Ruth

    2015-01-01

    Full Text Available The origin of agricultural products is gaining in appreciation while often hard to determine for various reasons. Geographical origin may be resolved using a combination of chemical and physical analytical technologies. In the present case of Lily of the Valley (Convallaria majalis rhizomes, we investigated an exploratory set of material from The Netherlands, three other European (EU countries and China. We show that the geographical origin is correlated to patterns of stable isotope ratios (isotope fingerprints and volatile organic carbon (VOC compounds (chemical fingerprints. These fingerprints allowed clear distinction using exploratory and supervised statistics. Isotope ratio mass spectrometry of 12C/13C, 14N/15N and 16O/18O isotopes separated materials from Europe and China successfully. The VOC patterns measured by Proton Transfer Reaction Mass Spectrometry (PTR-MS allowed distinction of three groups: material from The Netherlands, the other EU countries and China. This knowledge is expected to help developing a systematic and efficient analytical tool for authenticating the origin of flower bulbs.

  11. Fingerprint authentication via joint transform correlator and its application in remote access control of a 3D microscopic system

    Science.gov (United States)

    He, Wenqi; Lai, Hongji; Wang, Meng; Liu, Zeyi; Yin, Yongkai; Peng, Xiang

    2014-05-01

    We present a fingerprint authentication scheme based on the optical joint transform correlator (JTC) and further describe its application to the remote access control of a Network-based Remote Laboratory (NRL). It is built to share a 3D microscopy system of our realistic laboratory in Shenzhen University with the remote co-researchers in Stuttgart University. In this article, we would like to focus on the involved security issues, mainly on the verification of various remote visitors to our NRL. By making use of the JTC-based optical pattern recognition technique as well as the Personal Identification Number (PIN), we are able to achieve the aim of authentication and access control for any remote visitors. Note that only the authorized remote visitors could be guided to the Virtual Network Computer (VNC), a cross-platform software, which allows the remote visitor to access the desktop applications and visually manipulate the instruments of our NRL through the internet. Specifically to say, when a remote visitor attempts to access to our NRL, a PIN is mandatory required in advance, which is followed by fingerprint capturing and verification. Only if both the PIN and the fingerprint are correct, can one be regarded as an authorized visitor, and then he/she would get the authority to visit our NRL by the VNC. It is also worth noting that the aforementioned "two-step verification" strategy could be further applied to verify the identity levels of various remote visitors, and therefore realize the purpose of diversified visitor management.

  12. Cluster analysis of Helicobacter pylori genomic DNA fingerprints suggests gastroduodenal disease-specific associations.

    Science.gov (United States)

    Go, M F; Chan, K Y; Versalovic, J; Koeuth, T; Graham, D Y; Lupski, J R

    1995-07-01

    Helicobacter pylori infection is now accepted as the most common cause of chronic active gastritis and peptic ulcer disease. The etiologies of many infectious diseases have been attributed to specific or clonal strains of bacterial pathogens. Polymerase chain reaction (PCR) amplification of DNA between repetitive DNA sequences, REP elements (REP-PCR), has been utilized to generate DNA fingerprints to examine similarity among strains within a bacterial species. Genomic DNA from H. pylori isolates obtained from 70 individuals (39 duodenal ulcers and 31 simple gastritis) was PCR-amplified using consensus probes to repetitive DNA elements. The H. pylori DNA fingerprints were analyzed for similarity and correlated with disease presentation using the NTSYS-pc computer program. Each H. pylori strain had a distinct DNA fingerprint except for two pairs. Single-colony DNA fingerprints of H. pylori from the same patient were identical, suggesting that each patient harbors a single strain. Computer-assisted cluster analysis of the REP-PCR DNA fingerprints showed two large clusters of isolates, one associated with simple gastritis and the other with duodenal ulcer disease. Cluster analysis of REP-PCR DNA fingerprints of H. pylori strains suggests that duodenal ulcer isolates, as a group, are more similar to one another and different from gastritis isolates. These results suggest that disease-specific strains may exist.

  13. Nucleic Acid Templated Reactions for Chemical Biology.

    Science.gov (United States)

    Di Pisa, Margherita; Seitz, Oliver

    2017-06-21

    Nucleic acid directed bioorthogonal reactions offer the fascinating opportunity to unveil and redirect a plethora of intracellular mechanisms. Nano- to picomolar amounts of specific RNA molecules serve as templates and catalyze the selective formation of molecules that 1) exert biological effects, or 2) provide measurable signals for RNA detection. Turnover of reactants on the template is a valuable asset when concentrations of RNA templates are low. The idea is to use RNA-templated reactions to fully control the biodistribution of drugs and to push the detection limits of DNA or RNA analytes to extraordinary sensitivities. Herein we review recent and instructive examples of conditional synthesis or release of compounds for in cellulo protein interference and intracellular nucleic acid imaging. © 2017 The Authors. Published by Wiley-VCH Verlag GmbH & Co. KGaA.

  14. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    Science.gov (United States)

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  15. DNA Fingerprinting of Chinese Melon Provides Evidentiary Support of Seed Quality Appraisal

    Science.gov (United States)

    Gao, Peng; Ma, Hongyan; Luan, Feishi; Song, Haibin

    2012-01-01

    Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs) are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines). Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC) were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines) were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR) codes of 471 melon varieties (lines) were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications. PMID:23285039

  16. DNA fingerprinting of Chinese melon provides evidentiary support of seed quality appraisal.

    Directory of Open Access Journals (Sweden)

    Peng Gao

    Full Text Available Melon, Cucumis melo L. is an important vegetable crop worldwide. At present, there are phenomena of homonyms and synonyms present in the melon seed markets of China, which could cause variety authenticity issues influencing the process of melon breeding, production, marketing and other aspects. Molecular markers, especially microsatellites or simple sequence repeats (SSRs are playing increasingly important roles for cultivar identification. The aim of this study was to construct a DNA fingerprinting database of major melon cultivars, which could provide a possibility for the establishment of a technical standard system for purity and authenticity identification of melon seeds. In this study, to develop the core set SSR markers, 470 polymorphic SSRs were selected as the candidate markers from 1219 SSRs using 20 representative melon varieties (lines. Eighteen SSR markers, evenly distributed across the genome and with the highest contents of polymorphism information (PIC were identified as the core marker set for melon DNA fingerprinting analysis. Fingerprint codes for 471 melon varieties (lines were established. There were 51 materials which were classified into17 groups based on sharing the same fingerprint code, while field traits survey results showed that these plants in the same group were synonyms because of the same or similar field characters. Furthermore, DNA fingerprinting quick response (QR codes of 471 melon varieties (lines were constructed. Due to its fast readability and large storage capacity, QR coding melon DNA fingerprinting is in favor of read convenience and commercial applications.

  17. Structural Fingerprints of Transcription Factor Binding Site Regions

    Directory of Open Access Journals (Sweden)

    Peter Willett

    2009-03-01

    Full Text Available Fourier transforms are a powerful tool in the prediction of DNA sequence properties, such as the presence/absence of codons. We have previously compiled a database of the structural properties of all 32,896 unique DNA octamers. In this work we apply Fourier techniques to the analysis of the structural properties of human chromosomes 21 and 22 and also to three sets of transcription factor binding sites within these chromosomes. We find that, for a given structural property, the structural property power spectra of chromosomes 21 and 22 are strikingly similar. We find common peaks in their power spectra for both Sp1 and p53 transcription factor binding sites. We use the power spectra as a structural fingerprint and perform similarity searching in order to find transcription factor binding site regions. This approach provides a new strategy for searching the genome data for information. Although it is difficult to understand the relationship between specific functional properties and the set of structural parameters in our database, our structural fingerprints nevertheless provide a useful tool for searching for function information in sequence data. The power spectrum fingerprints provide a simple, fast method for comparing a set of functional sequences, in this case transcription factor binding site regions, with the sequences of whole chromosomes. On its own, the power spectrum fingerprint does not find all transcription factor binding sites in a chromosome, but the results presented here show that in combination with other approaches, this technique will improve the chances of identifying functional sequences hidden in genomic data.

  18. Chromatographic fingerprinting: An innovative approach for food 'identitation' and food authentication - A tutorial.

    Science.gov (United States)

    Cuadros-Rodríguez, Luis; Ruiz-Samblás, Cristina; Valverde-Som, Lucia; Pérez-Castaño, Estefanía; González-Casado, Antonio

    2016-02-25

    Fingerprinting methods describe a variety of analytical methods that provide analytical signals related to the composition of foodstuffs in a non-selective way such as by collecting a spectrum or a chromatogram. Mathematical processing of the information in such fingerprints may allow the characterisation and/or authentication of foodstuffs. In this context, the particular meaning of 'fingerprinting', in conjunction with 'profiling', is different from the original meanings used in metabolomics. This fact has produced some confusion with the use of these terms in analytical papers. Researchers coming from the metabolomic field could use 'profiling' or 'fingerprinting' on a different way to researchers who are devoted to food science. The arrival of an eclectic discipline, named 'foodomics' has not been enough to allay this terminological problem, since the authors keep on using the terms with both meanings. Thus, a first goal of this tutorial is to clarify the difference between both terms. In addition, the chemical approaches for food authentication, i.e., chemical markers, component profiling and instrumental fingerprinting, have been described. A new term, designated as 'food identitation', has been introduced in order to complete the life cycle of the chemical-based food authentication process. Chromatographic fingerprinting has been explained in detail and some strategies which could be applied has been clarified and discussed. Particularly, the strategies for chromatographic signals acquisition and chromatographic data handling are unified in a single framework. Finally, an overview about the applications of chromatographic (GC and LC) fingerprints in food authentication using different chemometric techniques has been included. Copyright © 2016 Elsevier B.V. All rights reserved.

  19. Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes

    NARCIS (Netherlands)

    Maijenburg, A.W.

    2014-01-01

    This thesis is entitled “Templated electrodeposition of functional nanostructures: nanowires, nanotubes and nanocubes”. Templated electrodeposition is the synthesis technique that was used throughout this thesis, and it comprises the use of a template with specific shape and dimensions for the

  20. Quantifying the provenance of aeolian sediments using multiple composite fingerprints

    Science.gov (United States)

    Liu, Benli; Niu, Qinghe; Qu, Jianjun; Zu, Ruiping

    2016-09-01

    We introduce a new fingerprinting method that uses multiple composite fingerprints for studies of aeolian sediment provenance. We used this method to quantify the provenance of sediments on both sides of the Qinghai-Tibetan Railway (QTR) in the Cuona Lake section of the Tibetan Plateau (TP), in an environment characterized by aeolian and fluvial interactions. The method involves repeatedly solving a linear mixing model based on mass conservation; the model is not limited to spatial scale or transport types and uses all the tracer groups that passed the range check, Kruskal-Wallis H-test, and a strict analytical solution screening. The proportional estimates that result from using different composite fingerprints are highly variable; however, the average of these fingerprints has a greater accuracy and certainty than any single fingerprint. The results show that sand from the lake beach, hilly surface, and gullies contribute, respectively, 48%, 31% and 21% to the western railway sediments and 43%, 33% and 24% to the eastern railway sediments. The difference between contributions from various sources on either side of the railway, which may increase in the future, was clearly related to variations in local transport characteristics, a conclusion that is supported by grain size analysis. The construction of the QTR changed the local cycling of materials, and the difference in provenance between the sediments that are separated by the railway reflects the changed sedimentary conditions on either side of the railway. The effectiveness of this method suggests that it will be useful in other studies of aeolian sediments.

  1. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Science.gov (United States)

    Sequeira, Ana F.; Cardoso, Jaime S.

    2015-01-01

    Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system. PMID:26102491

  2. Fingerprint Liveness Detection in the Presence of Capable Intruders

    Directory of Open Access Journals (Sweden)

    Ana F. Sequeira

    2015-06-01

    Full Text Available Fingerprint liveness detection methods have been developed as an attempt to overcome the vulnerability of fingerprint biometric systems to spoofing attacks. Traditional approaches have been quite optimistic about the behavior of the intruder assuming the use of a previously known material. This assumption has led to the use of supervised techniques to estimate the performance of the methods, using both live and spoof samples to train the predictive models and evaluate each type of fake samples individually. Additionally, the background was often included in the sample representation, completely distorting the decision process. Therefore, we propose that an automatic segmentation step should be performed to isolate the fingerprint from the background and truly decide on the liveness of the fingerprint and not on the characteristics of the background. Also, we argue that one cannot aim to model the fake samples completely since the material used by the intruder is unknown beforehand. We approach the design by modeling the distribution of the live samples and predicting as fake the samples very unlikely according to that model. Our experiments compare the performance of the supervised approaches with the semi-supervised ones that rely solely on the live samples. The results obtained differ from the ones obtained by the more standard approaches which reinforces our conviction that the results in the literature are misleadingly estimating the true vulnerability of the biometric system.

  3. Nanowires and nanostructures fabrication using template methods

    DEFF Research Database (Denmark)

    Mátéfi-Tempfli, Stefan; Mátéfi-Tempfli, M.; Vlad, A.

    2009-01-01

    One of the great challenges of today is to find reliable techniques for the fabrication of nanomaterials and nanostructures. Methods based on template synthesis and on self organization are the most promising due to their easiness and low cost. This paper focuses on the electrochemical synthesis ...... of nanowires and nanostructures using nanoporous host materials such as supported anodic aluminum considering it as a key template for nanowires based devices. New ways are opened for applications by combining such template synthesis methods with nanolithographic techniques....

  4. DWI-Based Neural Fingerprinting Technology: A Preliminary Study on Stroke Analysis

    Directory of Open Access Journals (Sweden)

    Chenfei Ye

    2014-01-01

    Full Text Available Stroke is a common neural disorder in neurology clinics. Magnetic resonance imaging (MRI has become an important tool to assess the neural physiological changes under stroke, such as diffusion weighted imaging (DWI and diffusion tensor imaging (DTI. Quantitative analysis of MRI images would help medical doctors to localize the stroke area in the diagnosis in terms of structural information and physiological characterization. However, current quantitative approaches can only provide localization of the disorder rather than measure physiological variation of subtypes of ischemic stroke. In the current study, we hypothesize that each kind of neural disorder would have its unique physiological characteristics, which could be reflected by DWI images on different gradients. Based on this hypothesis, a DWI-based neural fingerprinting technology was proposed to classify subtypes of ischemic stroke. The neural fingerprint was constructed by the signal intensity of the region of interest (ROI on the DWI images under different gradients. The fingerprint derived from the manually drawn ROI could classify the subtypes with accuracy 100%. However, the classification accuracy was worse when using semiautomatic and automatic method in ROI segmentation. The preliminary results showed promising potential of DWI-based neural fingerprinting technology in stroke subtype classification. Further studies will be carried out for enhancing the fingerprinting accuracy and its application in other clinical practices.

  5. Accommodating error analysis in comparison and clustering of molecular fingerprints.

    OpenAIRE

    Salamon, H.; Segal, M. R.; Ponce de Leon, A.; Small, P. M.

    1998-01-01

    Molecular epidemiologic studies of infectious diseases rely on pathogen genotype comparisons, which usually yield patterns comprising sets of DNA fragments (DNA fingerprints). We use a highly developed genotyping system, IS6110-based restriction fragment length polymorphism analysis of Mycobacterium tuberculosis, to develop a computational method that automates comparison of large numbers of fingerprints. Because error in fragment length measurements is proportional to fragment length and is ...

  6. A New Technique in saving Fingerprint with low volume by using Chaos Game and Fractal Theory

    Directory of Open Access Journals (Sweden)

    Maryam Ashourzadeh

    2010-12-01

    Full Text Available Fingerprint is one of the simplest and most reliable biometric features of human for identification. In this study by using fractal theory and by the assistance of Chaos Game a new fractal is made from fingerprint. While making the new fractal by using Chaos Game mechanism some parameters, which can be used in identification process, can be deciphered. For this purpose, a fractal is made for each fingerprint, we save 10 parameters for every fingerprint, which have necessary information for identity, as said before. So we save 10 decimal parameters with 0.02 accuracy instead of saving the picture of a fingerprint or some parts of it. Now we improve the great volume of fingerprint pictures by using this model which employs fractal for knowing the personality

  7. LED intense headband light source for fingerprint analysis

    Science.gov (United States)

    Villa-Aleman, Eliel

    2005-03-08

    A portable, lightweight and high-intensity light source for detecting and analyzing fingerprints during field investigation. On-site field analysis requires long hours of mobile analysis. In one embodiment, the present invention comprises a plurality of light emitting diodes; a power source; and a personal attachment means; wherein the light emitting diodes are powered by the power source, and wherein the power source and the light emitting diodes are attached to the personal attachment means to produce a personal light source for on-site analysis of latent fingerprints. The present invention is available for other applications as well.

  8. Fingerprint segmentation: an investigation of various techniques and a parameter study of a variance-based method

    CSIR Research Space (South Africa)

    Msiza, IS

    2011-09-01

    Full Text Available Fingerprint image segmentation plays an important role in any fingerprint image analysis implementation and it should, ideally, be executed during the initial stages of a fingerprint manipulation process. After careful consideration of various...

  9. Three-dimensional metallic opals fabricated by double templating

    International Nuclear Information System (INIS)

    Yan Qingfeng; Nukala, Pavan; Chiang, Yet-Ming; Wong, C.C.

    2009-01-01

    We report a simple and cost-effective double templating method for fabricating large-area three-dimensional metallic photonic crystals of controlled thickness. A self-assembled polystyrene opal was used as the first template to fabricate a silica inverse opal on a gold-coated glass substrate via sol-gel processing. Gold was subsequently infiltrated to the pores of the silica inverse opal using electrochemical deposition. A high-quality three-dimensional gold photonic crystal was obtained after removal of the secondary template (silica inverse opal). The effects of template sphere size and deposition current density on the gold growth rate, and the resulting morphology and growth mechanism of the gold opal, were investigated.

  10. Light Weight Biomorphous Cellular Ceramics from Cellulose Templates

    Science.gov (United States)

    Singh, Mrityunjay; Yee, Bo-Moon; Gray, Hugh R. (Technical Monitor)

    2003-01-01

    Bimorphous ceramics are a new class of materials that can be fabricated from the cellulose templates derived from natural biopolymers. These biopolymers are abundantly available in nature and are produced by the photosynthesis process. The wood cellulose derived carbon templates have three- dimensional interconnectivity. A wide variety of non-oxide and oxide based ceramics have been fabricated by template conversion using infiltration and reaction-based processes. The cellular anatomy of the cellulose templates plays a key role in determining the processing parameters (pyrolysis, infiltration conditions, etc.) and resulting ceramic materials. The processing approach, microstructure, and mechanical properties of the biomorphous cellular ceramics (silicon carbide and oxide based) have been discussed.

  11. Detection of visible and latent fingerprints using micro-X-ray fluorescence elemental imaging.

    Science.gov (United States)

    Worley, Christopher G; Wiltshire, Sara S; Miller, Thomasin C; Havrilla, George J; Majidi, Vahid

    2006-01-01

    Using micro-X-ray fluorescence (MXRF), a novel means of detecting fingerprints was examined in which the prints were imaged based on their elemental composition. MXRF is a nondestructive technique. Although this method requires a priori knowledge about the approximate location of a print, it offers a new and complementary means for detecting fingerprints that are also left pristine for further analysis (including potential DNA extraction) or archiving purposes. Sebaceous fingerprints and those made after perspiring were detected based on elements such as potassium and chlorine present in the print residue. Unique prints were also detected including those containing lotion, saliva, banana, or sunscreen. This proof-of-concept study demonstrates the potential for visualizing fingerprints by MXRF on surfaces that can be problematic using current methods.

  12. Improving your target-template alignment with MODalign.

    KAUST Repository

    Barbato, Alessandro

    2012-02-04

    SUMMARY: MODalign is an interactive web-based tool aimed at helping protein structure modelers to inspect and manually modify the alignment between the sequences of a target protein and of its template(s). It interactively computes, displays and, upon modification of the target-template alignment, updates the multiple sequence alignments of the two protein families, their conservation score, secondary structure and solvent accessibility values, and local quality scores of the implied three-dimensional model(s). Although it has been designed to simplify the target-template alignment step in modeling, it is suitable for all cases where a sequence alignment needs to be inspected in the context of other biological information. AVAILABILITY AND IMPLEMENTATION: Freely available on the web at http://modorama.biocomputing.it/modalign. Website implemented in HTML and JavaScript with all major browsers supported. CONTACT: jan.kosinski@uniroma1.it.

  13. Durable diamond-like carbon templates for UV nanoimprint lithography

    International Nuclear Information System (INIS)

    Tao, L; Ramachandran, S; Nelson, C T; Overzet, L J; Goeckner, M; Lee, G; Hu, W; Lin, M; Willson, C G; Wu, W

    2008-01-01

    The interaction between resist and template during the separation process after nanoimprint lithography (NIL) can cause the formation of defects and damage to the templates and resist patterns. To alleviate these problems, fluorinated self-assembled monolayers (F-SAMs, i.e. tridecafluoro-1,1,2,2,tetrahydrooctyl trichlorosilane or FDTS) have been employed as template release coatings. However, we find that the FDTS coating undergoes irreversible degradation after only 10 cycles of UV nanoimprint processes with SU-8 resist. The degradation includes a 28% reduction in surface F atoms and significant increases in the surface roughness. In this paper, diamond-like carbon (DLC) films were investigated as an alternative material not only for coating but also for direct fabrication of nanoimprint templates. DLC films deposited on quartz templates in a plasma enhanced chemical vapor deposition system are shown to have better chemical and physical stability than FDTS. After the same 10 cycles of UV nanoimprints, the surface composition as well as the roughness of DLC films were found to be unchanged. The adhesion energy between the DLC surface and SU-8 is found to be smaller than that of FDTS despite the slightly higher total surface energy of DLC. DLC templates with 40 nm features were fabricated using e-beam lithography followed by Cr lift-off and reactive ion etching. UV nanoimprinting using the directly patterned DLC templates in SU-8 resist demonstrates good pattern transfer fidelity and easy template-resist separation. These results indicate that DLC is a promising material for fabricating durable templates for UV nanoimprint lithography

  14. Business Process Variability : A Tool for Declarative Template Design

    NARCIS (Netherlands)

    Bulanov, P.; Groefsema, H.; Aiello, M.

    2012-01-01

    To lower both implementation time and cost, many Business Process Management tools use process templates to implement highly recurring processes. However, in order for such templates to be used, a process has to adhere substantially to the template. Therefore, current practice for processes which

  15. EKF-GPR-Based Fingerprint Renovation for Subset-Based Indoor Localization with Adjusted Cosine Similarity.

    Science.gov (United States)

    Yang, Junhua; Li, Yong; Cheng, Wei; Liu, Yang; Liu, Chenxi

    2018-01-22

    Received Signal Strength Indicator (RSSI) localization using fingerprint has become a prevailing approach for indoor localization. However, the fingerprint-collecting work is repetitive and time-consuming. After the original fingerprint radio map is built, it is laborious to upgrade the radio map. In this paper, we describe a Fingerprint Renovation System (FRS) based on crowdsourcing, which avoids the use of manual labour to obtain the up-to-date fingerprint status. Extended Kalman Filter (EKF) and Gaussian Process Regression (GPR) in FRS are combined to calculate the current state based on the original fingerprinting radio map. In this system, a method of subset acquisition also makes an immediate impression to reduce the huge computation caused by too many reference points (RPs). Meanwhile, adjusted cosine similarity (ACS) is employed in the online phase to solve the issue of outliers produced by cosine similarity. Both experiments and analytical simulation in a real Wireless Fidelity (Wi-Fi) environment indicate the usefulness of our system to significant performance improvements. The results show that FRS improves the accuracy by 19.6% in the surveyed area compared to the radio map un-renovated. Moreover, the proposed subset algorithm can bring less computation.

  16. EKF–GPR-Based Fingerprint Renovation for Subset-Based Indoor Localization with Adjusted Cosine Similarity

    Science.gov (United States)

    Yang, Junhua; Li, Yong; Cheng, Wei; Liu, Yang; Liu, Chenxi

    2018-01-01

    Received Signal Strength Indicator (RSSI) localization using fingerprint has become a prevailing approach for indoor localization. However, the fingerprint-collecting work is repetitive and time-consuming. After the original fingerprint radio map is built, it is laborious to upgrade the radio map. In this paper, we describe a Fingerprint Renovation System (FRS) based on crowdsourcing, which avoids the use of manual labour to obtain the up-to-date fingerprint status. Extended Kalman Filter (EKF) and Gaussian Process Regression (GPR) in FRS are combined to calculate the current state based on the original fingerprinting radio map. In this system, a method of subset acquisition also makes an immediate impression to reduce the huge computation caused by too many reference points (RPs). Meanwhile, adjusted cosine similarity (ACS) is employed in the online phase to solve the issue of outliers produced by cosine similarity. Both experiments and analytical simulation in a real Wireless Fidelity (Wi-Fi) environment indicate the usefulness of our system to significant performance improvements. The results show that FRS improves the accuracy by 19.6% in the surveyed area compared to the radio map un-renovated. Moreover, the proposed subset algorithm can bring less computation. PMID:29361805

  17. Collusion-resistant audio fingerprinting system in the modulated complex lapped transform domain.

    Directory of Open Access Journals (Sweden)

    Jose Juan Garcia-Hernandez

    Full Text Available Collusion-resistant fingerprinting paradigm seems to be a practical solution to the piracy problem as it allows media owners to detect any unauthorized copy and trace it back to the dishonest users. Despite the billionaire losses in the music industry, most of the collusion-resistant fingerprinting systems are devoted to digital images and very few to audio signals. In this paper, state-of-the-art collusion-resistant fingerprinting ideas are extended to audio signals and the corresponding parameters and operation conditions are proposed. Moreover, in order to carry out fingerprint detection using just a fraction of the pirate audio clip, block-based embedding and its corresponding detector is proposed. Extensive simulations show the robustness of the proposed system against average collusion attack. Moreover, by using an efficient Fast Fourier Transform core and standard computer machines it is shown that the proposed system is suitable for real-world scenarios.

  18. MOCVD epitaxy of InAlN on different templates

    International Nuclear Information System (INIS)

    Yun Lijun; Wei Tongbo; Yan Jianchang; Liu Zhe; Wang Junxi; Li Jinmin

    2011-01-01

    InAlN epilayers were grown on high quality GaN and AlN templates with the same growth parameters. Measurement results showed that two samples had the same In content of ∼ 16%, while the crystal quality and surface topography of the InAlN epilayer grown on the AlN template, with 282.3 (002) full width at half maximum (FWHM) of rocking curve, 313.5 (102) FWHM, surface roughness of 0.39 nm and V-pit density of 2.8 x 10 8 cm -2 , were better than that of the InAlN epilayer grown on the GaN template, 309.3, 339.1, 0.593 nm and 4.2 x 10 8 cm -2 . A primary conclusion was proposed that both the crystal quality and the surface topography of the InAlN epilayer grown on the AlN template were better than that of the InAlN epilayer grown on the GaN template. Therefore, the AlN template was a better choice than the GaN template for getting high quality InAlN epilayers. (semiconductor materials)

  19. Joomla! 3 template essentials

    CERN Document Server

    Frankowski, Pawel

    2013-01-01

    Using this hands-on, step-by step tutorial filled with practical examples, the readers will be able to create beautiful templates and themes for your websites that will make them stand out from others.This book is written for all of you who wish to create your own unique templates for Joomla! 3.x. This book can be used by Joomla! administrators or visual designers (with no programming experience) or those of you who are used to working with common web developer tools like HTML/CSS editors for coding purposes. You would need basic knowledge of Joomla! and some knowledge of CSS and HTML.

  20. [Comparison of Bacteria ERIC-PCR Fingerprints of Index Fingers and Contactants].

    Science.gov (United States)

    Liu, Y T; Sun, D M; Shi, S P; Yang, X

    2018-02-01

    To explore the bacteria relevance between index fingers and contactant' surfaces (mobile phone touch screen and desktop of personal office table). Bacteria were collected from the index fingers, mobile phone touch screen and desktop of personal office table of 10 volunteers. Enterobacterial repetitive intergenic consensus (ERIC)-PCR fingerprint was established by PCR amplification technique of metagenome. There were 7 volunteers' ERIC-PCR fingerprints of index fingers matched that took from the mobile phone touch screens, and different from each other. There were 3 volunteers' ERIC-PCR fingerprints of index fingers matched that took from desk top of personal office table, and other 7 volunteers' ERIC-PCR fingerprints did not match perfectly with that took from desk top of personal office table, but had at least one similar band for both. The bacteria on index finger shows individual specificity, which on mobile phone touching screen and personal desktop may be a new biological sample of forensic identification. Copyright© by the Editorial Department of Journal of Forensic Medicine.