Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Size: px
Start display at page:

Download "Biometric Authentication for secure e-transactions: Research Opportunities and Trends"

Transcription

1 Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) Within the current level of reliance on Information Systems in a daily basis, authenticating end-users for security purposes within public and private sectors has never been more significant to all enterprises. Furthermore, the necessity for automated methods for securing online systems are critical and challenging issues. Within any security procedure, users authentication considered as the first action to confirm security and control access. Today, Biometrics can play a major role in information security and authentication within any information system. In fact, as a result of users demand for secure devices, application, transactions and payment methods, Biometrics technology becomes a solid research field. In combine with other technologies Biometrics Authentication can solve various difficult security issues. This paper will outline the research directions that have newly emerged in the field of biometric-based authentication systems. This work will also shed some light on the position of biometrics technology in the existing domain of Security. In addition, the state of the art methodologies being used for better Biometrics authentication technologies has been investigated. The paper concludes with a number of possible challenges and barriers which could face researchers in the field of biometric authentication. Keywords: Authentication, Biometric, E-transactions, Security. BACKGROUND Recently, the security research field has perceived great development to all information access aspects. Distinguished growth has been made in emerging effective methods to challenge the difficulties of user authentication, encryption and protection, information security and privacy. Within the domain of security research, biometric authentication firmly well-known itself as one of the most effective and reliable tools for delivering flexible access control to a secure system (M. Gavrilova, et al., 2013). Although recent methods for biometric authentication are becoming gradually easy to use and strong, unfortunately the same cannot be said about the security of end-users populating cyber worlds. Biometric technologies are one of the most important innovation in the IT field, and the biometric system industry and market have grown and is projected to reach a value of $24.44 billion by 2020, according to MarketsandMarkets In fact, confirming secure communication amongst individuals besides their identities presents massive challenges to academics and industry. Identity theft, security breaches, credit card scam, and e-criminal activities are just some of security problems that plague our society. Nevertheless, one of the most critical mechanisms for guaranteeing security within

2 our online activates; the connection of online users with their identities in the everyday life has been mainly unnoticed. Studies and efforts to develop effective security solutions to this critical issues are the key motivation of this paper. Biometrics are defined as measurable physiological and/or behavioural features that can be utilised to verify the identity a person. Biometrics include fingerprint verification, hand geometry, retinal scanning, iris scanning, face recognition, and signature verification (Ashbourn, 2000). Generally, physical and behavioural characteristics used by biometrics include the following taxonomy (Zhang 2000): Figure 1: Physical and behavioural characteristics used by biometrics (Zhang 2000) There are three main socio-cultural anxiety regarding biometrics: information privacy, physical privacy, and religious objections Woodward et al. (2001): Information privacy Some concerns were identified such the concern about the tracking and misuse of data, especially within web environment (Prabhakar, et al., 2003). Physical privacy Several biometrics have a certain stigma attached to them and can avoid individuals from using the biometrics technology at ease. Fingerprint, for instance, has an undeserved stigma from its association with criminal manners. Religious objections

3 Different countries have different cultures and religious beliefs which rule business and social practices, and persons will be uncertain to adopt practices considered contrary to their cultural or religious dictates(f. Al-Harby, et al., 2009). A TYPICAL BIOMETRIC SYSTEM Any biometric system contains five components (S. Salawadgi, 2014).: 1- A sensor to gather the data and convert the information to a digital format. 2- Signal processing algorithms to achieve quality control activities and progress the biometric template. 3- A data storage element which retains information that new biometric templates will be compared to. 4- A matching algorithm which compares the new biometric template to one or more templates kept in data storage. 5- A decision process which uses the results from the matching component to make a system-level decision. A Biometric system includes three parts: Input Device: such as scanner to record any inputs which are then used by the software part. Biometrics Software: a software processes the input and converts it into digital form, extract the features, and compare all the results. Database: to store the information, which used for evaluation. As well, features extracted from input samples are stored in the database and storing features in the database saves the time for processing. BIOMETRIC PROCESSES Biometric systems depend on some separate processes: enrolment, live capture, template extraction and comparison. The purpose of enrolment is to gather and store biometric samples beside creating numerical templates for any future comparisons. By storing the raw samples, new replacement templates can be generated in the event that a new or updated comparison algorithm is presented to the system. Template extraction needs signal processing of the raw biometric samples (e.g. images or audio samples) to yield a numerical template. Templates are typically generated and stored upon enrolment to secure processing time upon upcoming comparisons. Comparison of two biometric templates applies algorithmic computations to measure their likeness. At comparison level, a match score is allocated. If it is above a specified threshold, the templates are considered a match. For better recognition rate, multiple samples for each individual are gathered through registration. At the verification step, similar set of features which have been extracted through enrolment process are extracted from the input samples scanned or recorded using input devices, to form the feature vectors. Verification is 1 to 1 matching. Within verification, the individual claims his or her identity which is confirmed by comparing these feature

4 vectors by the feature vectors of the individual which he or she claimed to be. If the matching rate crosses the threshold then the system will validate the individual as authentic user, or the individual will be rejected (S. Salawadgi, 2014). Likewise, for the identification similar set of features which have been extracted during enrolment process are extracted from the input samples scanned or recorded using input devices, to form the feature vectors. Identification is 1 to n matching. The feature vectors of the individual are compared with the feature vectors of every individual stored in the database. If the highest matching score crosses the threshold, at that time it identifies the individual as the person whose similar rate is the highest ( M.L. Gavrilova, 2014). Fig. 2. Biometric System Architecture (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA) PERFORMANCE The accuracy of a biometric system is typically measured mostly by a receiver operating characteristic, or ROC curve plot which represent its false match rate (FMR) and false non-match rate (FNMR) counter to some biometric sample gallery. While FMR is the frequency with which biometric samples from diverse sources are incorrectly evaluated to be from the matching source, FNMR is the frequency with which samples from the exact source are erroneously assessed to be from different sources (Aware, 2014).

5 Fig. 3. An ROC curve for a given biometric matching system and dataset. (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA). Typically, a well-performing biometric system is characterized by prompt results and low rates of FMR and FNMR. The accuracy of a system falls on a point on the ROC curve whose location is a function of the matching threshold applied. A higher match threshold reduces false match rate but increases false non-match rate (higher security, lower convenience). As well, a lower match threshold reduces the false non-match rate but increases false match rate (higher convenience, lower security). Higher quantities of data (e.g. more fingerprints) and higher-quality (highly consistent) samples are required for one-to-many search processes as compared to one-to-one matching for authentication (Aware, 2014). Fig. 4. Density functions of comparison scores between a) samples from different sources and b) samples from the same sources, illustrating FMR and FNMR. (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA).

6 STATE-OF-THE ART METHODOLOGY The state-of-the art methodology for biometric authentication involves of: Appearance based and feature methods for recognizing and comparing similar patterns in different user s biometric data ( S. Yanushkevich, et al., 2007). Dimensionality-reduction techniques for extracting and learning the most important biometric characteristic, for example, Principal Component Analysis (PCA), k-mean clustering and Chaotic Neural Networks ( Y. Tian, et al., 2012). Novel decision-making techniques based on information fusion, Markov chains, fuzzy logic, and cognitive informatics (M. Gavrilova, et al., 2013). Researchers argues for the use of multi-modal biometric system rather than the single biometric method (M. Monwar, et al., 2009). It has been well recognized during the last decade that individual biometrics have a number of lacks, together with issues of universality, uniqueness, poor sample quality, human error and changes over time. Due to the fact that multimodal biometric system can integrate two or more individual biometric characters, the overall system recognition rate can rise significantly. This issue remains accurate even in the presence of erroneous, incomplete or missing data. EMERGING METHODOLOGY Recently, three new approaches have been presented to biometric technology with implications for Cyberworld security problems: Discovering the capabilities of multi-modal biometric fusion methods within the setting of Cyberworld user identity recognition (M. Gavrilova, et al., 2011). Enhancing a set of metrics for classifying abnormal user behaviours through recognition of their physiological and behavioural traits ( S. Yanushkevich, et al., 2007). Presenting the concept of biometric cancellability in the framework of Cyberworld authentication (P. Paul, et al., 2012) These new approaches will offer a strong and unique methodology for improving user security via on-line societies. CHALLENGES Nowadays, new research continues to develop every day in the biometric authentication field; nevertheless, some challenges remain that are both essential and precise to Cyberworld. The recent issues facing the biometric authentication domain are ( M.L. Gavrilova, 2014): Further effective methods for intruder detection and prevention. Requirement for better privacy policies to protect user confidentiality. In case of changes in databases over time might need more advance training methods. Capability to use appropriate information gained in parallel to main biometric features.

7 Challenges with big data that request real-time performance with high recognition rates on very large data sources. FUTURE RESEARCH DIRECTIONS It is important to realise that other important issues may remain open for investigation such as ( M.L. Gavrilova, 2014): Recognition of normal vs abnormal on-line user behaviour over progressive pattern analysis of appearance-based and behavioural biometrics (typing patterns, voice, blogs). Examining on-line social network activities as new type of biometric traits, i.e. social biometrics (such as: Twitter, Facebook and LinkedIn). Emerging research into spatio-temporal biometrics for e-communities. Considering mechanism that contribute to generating effective on-line communities; Learning leadership and common personality traits in Cyberworld. Although work on some of the problems listed above has started, most of them continue untouched and present forthcoming research directions in the domain of biometric authentication. REFERENCES AL-Harby, F., Qahwaji, R., & Kamala, M. (2013). End-Users Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture: Applying the UTAUT Model. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp ). Hershey, PA: Information Science Reference. doi: / ch061 AL-Harby, F., Qahwajim, R., & Kamala, M. (2012). Towards an Understanding of User Acceptance to Use Biometrics Authentication Systems in E-Commerce: Using an Extension of the Technology Acceptance Model. In I. Lee (Ed.), Transformations in E-Business Technologies and Commerce: Emerging Impacts (pp ). Hershey, PA: Business Science Reference. doi: / ch007 Al-Harby F., R Qahwaji, and M Kamala, The effects of gender differences in the acceptance of biometrics authentication systems within online transaction, CYBERWORLD 2009, Published by IEEE computer society pp , September 7 11, 2009, UK AL-Harby F., R Qahwaji, & M Kamala, Users Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. The Second International Conference on Networked Digital Technologies (NDT 2010), Springer Lecture Notes in Computer Science.

8 Ashbourn, J. (2000). Biometrics: Advanced identity verification: The complete guide. London: Springer. Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA. Jain, A. (2004). Biometric recognition: How do I know who you are? Paper presented at the Signal Processing and Communications Applications Conference Proceedings of the 12th IEEE. Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), M.L. Gavrilova, Biometric-Based Authentication for Cyberworld Security: Challenges and Opportunities, University of Calgary June, 2014 M Gavrilova and R Yampolskiy Applying biometric principles to avatar recognition Transactions on computational science XII, , 2011 M. Gavrilova and M. Monwar Multimodal Biometrics and Intelligent Image Processing for Security Systems, IGI, book, 2013 M. Monwar and M. Gavrilova, Multimodal Biometric System Using Rank-Level Fusion Approach, IEEE Trans. on System, Man and Cybernetics, pp , vol. 39, no. 4, 2009 P. Paul and M. Gavrilova Multimodal Cancellable Biometric, 10th Int C on Cognitive Informatics & Cognitive Computing ICCI*CC 2012, IEEE, 43-50, Prabhakar, S., S. Pankanti, S., & Jain, A. K. (2003). Biometrics recognition: Security and privacy concerns. IEEE Security & Privacy, 1(2), Sarita Salawadgi, Biometrics: A Security Tool for 21 st Century, International Journal of Innovation and Applied Studies, vol. 8, no. 2, pp , September 2014 S. Yanushkevich, M. Gavrilova, P. Wang and S. Srihari, Image Pattern Recognition: Synthesis and Analysis in Biometrics, World Scientific Publishers, book, 2007 Y. Tian, Y. Wang, M. Gavrilova and G. Ruhe, A Formal Knowledge Representation System for the Intelligent Knowledge Base of a Cognitive Learning Engine, Int. J. of Software Science and Computational Intelligence IJSCCI, IGI, 1-17, Woodward, J. D., Webb, K. W., Newton, E. M., Bradley, M., & Rubenson, D. (2001). Army biometric applications: RAND Corporation. Zhang, D. (2000). Automated Biometrics: Technologies and Systems Norwell, MA: Kluwer Academic Publishers.

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

Biometrics Acceptance - Perceptions of Use of Biometrics

Biometrics Acceptance - Perceptions of Use of Biometrics Association for Information Systems AIS Electronic Library (AISeL) ACIS 2004 Proceedings Australasian (ACIS) December 2004 Biometrics Acceptance - Perceptions of Use of Biometrics Angela Chau University

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

IJRASET 2015: All Rights are Reserved

IJRASET 2015: All Rights are Reserved A Novel Approach For Indian Currency Denomination Identification Abhijit Shinde 1, Priyanka Palande 2, Swati Kamble 3, Prashant Dhotre 4 1,2,3,4 Sinhgad Institute of Technology and Science, Narhe, Pune,

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations

More information

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:

More information

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment. Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

An Enhanced Biometric System for Personal Authentication

An Enhanced Biometric System for Personal Authentication IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Investigation of Recognition Methods in Biometrics

Investigation of Recognition Methods in Biometrics Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Iris based Human Identification using Median and Gaussian Filter

Iris based Human Identification using Median and Gaussian Filter Iris based Human Identification using Median and Gaussian Filter Geetanjali Sharma 1 and Neerav Mehan 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 456-461

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence

Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,

More information

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES

FACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper FACE VERIFICATION SYSTEM

More information

ACADEMIC YEAR

ACADEMIC YEAR INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Towards affordance based human-system interaction based on cyber-physical systems

Towards affordance based human-system interaction based on cyber-physical systems Towards affordance based human-system interaction based on cyber-physical systems Zoltán Rusák 1, Imre Horváth 1, Yuemin Hou 2, Ji Lihong 2 1 Faculty of Industrial Design Engineering, Delft University

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Authentication Using Pulse-Response Biometrics

Authentication Using Pulse-Response Biometrics Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit

More information

Malaviya National Institute of Technology Jaipur

Malaviya National Institute of Technology Jaipur Malaviya National Institute of Technology Jaipur Advanced Pattern Recognition Techniques 26 th 30 th March 2018 Overview Pattern recognition is the scientific discipline in the field of computer science

More information

Exploring HowUser Routine Affects the Recognition Performance of alock Pattern

Exploring HowUser Routine Affects the Recognition Performance of alock Pattern Exploring HowUser Routine Affects the Recognition Performance of alock Pattern Lisa de Wilde, Luuk Spreeuwers, Raymond Veldhuis Faculty of Electrical Engineering, Mathematics and Computer Science University

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

1. First printing, TR , March, 2000.

1. First printing, TR , March, 2000. MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March

More information

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,

More information

ISSUANCE AND CIVIL REGISTRATION

ISSUANCE AND CIVIL REGISTRATION IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to

More information

Card IEEE Symposium Series on Computational Intelligence

Card IEEE Symposium Series on Computational Intelligence 2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,

More information

Modern Biometric Technologies: Technical Issues and Research Opportunities

Modern Biometric Technologies: Technical Issues and Research Opportunities Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric

More information

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS

RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

Applied Surveillance using Biometrics on Agents Infrastructures

Applied Surveillance using Biometrics on Agents Infrastructures Applied Surveillance using Biometrics on Agents Infrastructures Manolis Sardis, Vasilis Anagnostopoulos, Nikos Doulamis National Technical University of Athens, Department of Telecommunications & Software

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

Biometrical verification based on infrared heat vein patterns

Biometrical verification based on infrared heat vein patterns Proceedings of the 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015 Biometrical verification based on infrared heat vein patterns Elnaz Mazandarani a, Kaori Yoshida b,

More information

Sketch Matching for Crime Investigation using LFDA Framework

Sketch Matching for Crime Investigation using LFDA Framework International Journal of Engineering and Technical Research (IJETR) Sketch Matching for Crime Investigation using LFDA Framework Anjali J. Pansare, Dr.V.C.Kotak, Babychen K. Mathew Abstract Here we are

More information

Performance Analysis of Multimodal Biometric System Authentication

Performance Analysis of Multimodal Biometric System Authentication 290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute

More information

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander

More information

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster) Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation

More information

Impact of Resolution and Blur on Iris Identification

Impact of Resolution and Blur on Iris Identification 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES Ramandeep Chahal Department of CSE GVIET, Banur, Punjab, India ABSTRACT Biometric is the science for recognizing an individual on the basis of his or

More information

Fingerprint Combination for Privacy Protection

Fingerprint Combination for Privacy Protection Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract

More information

International Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017

International Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017 Measurement of Face Detection Accuracy Using Intensity Normalization Method and Homomorphic Filtering I Nyoman Gede Arya Astawa [1]*, I Ketut Gede Darma Putra [2], I Made Sudarma [3], and Rukmi Sari Hartati

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Auto-tagging The Facebook

Auto-tagging The Facebook Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Machinery Prognostics and Health Management. Paolo Albertelli Politecnico di Milano

Machinery Prognostics and Health Management. Paolo Albertelli Politecnico di Milano Machinery Prognostics and Health Management Paolo Albertelli Politecnico di Milano (paollo.albertelli@polimi.it) Goals of the Presentation maintenance approaches and companies that deals with manufacturing

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Online Diagnosis and Monitoring for Power Distribution System

Online Diagnosis and Monitoring for Power Distribution System Energy and Power Engineering, 1,, 59-53 http://dx.doi.org/1.3/epe.1. Published Online November 1 (http://www.scirp.org/journal/epe) Online Diagnosis and Monitoring for Power Distribution System Atef Almashaqbeh,

More information

Fuzzy-Heuristic Robot Navigation in a Simulated Environment

Fuzzy-Heuristic Robot Navigation in a Simulated Environment Fuzzy-Heuristic Robot Navigation in a Simulated Environment S. K. Deshpande, M. Blumenstein and B. Verma School of Information Technology, Griffith University-Gold Coast, PMB 50, GCMC, Bundall, QLD 9726,

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

The total manufacturing cost is estimated to be around INR. 12

The total manufacturing cost is estimated to be around INR.   12 Intelligent Integrated Home Security System Using Raspberry Pi Pallavi Mitra Department of Electronics and Communication Engineering,National Institute of Technology,Durgapur E-mail: pallavi08091992@gmail.com

More information

Biometrics. Duane M. Blackburn Federal Bureau of Investigation

Biometrics. Duane M. Blackburn Federal Bureau of Investigation 0 3 / 0 4 Biometrics Duane M. Blackburn Federal Bureau of Investigation 101 V e r s i o n 3. 1 Biometrics 101 1 Version 3.1 March 2004 Duane M. Blackburn 2 Federal Bureau of Investigation 3 1.0 Introduction

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition

Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

Near Infrared Face Image Quality Assessment System of Video Sequences

Near Infrared Face Image Quality Assessment System of Video Sequences 2011 Sixth International Conference on Image and Graphics Near Infrared Face Image Quality Assessment System of Video Sequences Jianfeng Long College of Electrical and Information Engineering Hunan University

More information

Keywords: Fuzzy Logic, Biometric, Fingerprint Sensor, Automation Teller Machine, Security

Keywords: Fuzzy Logic, Biometric, Fingerprint Sensor, Automation Teller Machine, Security REPRESENTATION OF COMPOUND METHODS OF FINGER AND INDIVIDUAL SPECIFICATION FROM FUZZY LOGIC FOR INCREASE THE SECURITY AND RECOGNITION OF USER IDENTIFY IN AUTOMATION TELLER MACHINE Zainab Moradyan, Mohsen

More information

Facial Recognition of Identical Twins

Facial Recognition of Identical Twins Facial Recognition of Identical Twins Matthew T. Pruitt, Jason M. Grant, Jeffrey R. Paone, Patrick J. Flynn University of Notre Dame Notre Dame, IN {mpruitt, jgrant3, jpaone, flynn}@nd.edu Richard W. Vorder

More information

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches

Performance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches Performance study of Text-independent Speaker identification system using & I for Telephone and Microphone Speeches Ruchi Chaudhary, National Technical Research Organization Abstract: A state-of-the-art

More information

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information