Biometric Authentication for secure e-transactions: Research Opportunities and Trends
|
|
- Brian Charles Small
- 6 years ago
- Views:
Transcription
1 Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) Within the current level of reliance on Information Systems in a daily basis, authenticating end-users for security purposes within public and private sectors has never been more significant to all enterprises. Furthermore, the necessity for automated methods for securing online systems are critical and challenging issues. Within any security procedure, users authentication considered as the first action to confirm security and control access. Today, Biometrics can play a major role in information security and authentication within any information system. In fact, as a result of users demand for secure devices, application, transactions and payment methods, Biometrics technology becomes a solid research field. In combine with other technologies Biometrics Authentication can solve various difficult security issues. This paper will outline the research directions that have newly emerged in the field of biometric-based authentication systems. This work will also shed some light on the position of biometrics technology in the existing domain of Security. In addition, the state of the art methodologies being used for better Biometrics authentication technologies has been investigated. The paper concludes with a number of possible challenges and barriers which could face researchers in the field of biometric authentication. Keywords: Authentication, Biometric, E-transactions, Security. BACKGROUND Recently, the security research field has perceived great development to all information access aspects. Distinguished growth has been made in emerging effective methods to challenge the difficulties of user authentication, encryption and protection, information security and privacy. Within the domain of security research, biometric authentication firmly well-known itself as one of the most effective and reliable tools for delivering flexible access control to a secure system (M. Gavrilova, et al., 2013). Although recent methods for biometric authentication are becoming gradually easy to use and strong, unfortunately the same cannot be said about the security of end-users populating cyber worlds. Biometric technologies are one of the most important innovation in the IT field, and the biometric system industry and market have grown and is projected to reach a value of $24.44 billion by 2020, according to MarketsandMarkets In fact, confirming secure communication amongst individuals besides their identities presents massive challenges to academics and industry. Identity theft, security breaches, credit card scam, and e-criminal activities are just some of security problems that plague our society. Nevertheless, one of the most critical mechanisms for guaranteeing security within
2 our online activates; the connection of online users with their identities in the everyday life has been mainly unnoticed. Studies and efforts to develop effective security solutions to this critical issues are the key motivation of this paper. Biometrics are defined as measurable physiological and/or behavioural features that can be utilised to verify the identity a person. Biometrics include fingerprint verification, hand geometry, retinal scanning, iris scanning, face recognition, and signature verification (Ashbourn, 2000). Generally, physical and behavioural characteristics used by biometrics include the following taxonomy (Zhang 2000): Figure 1: Physical and behavioural characteristics used by biometrics (Zhang 2000) There are three main socio-cultural anxiety regarding biometrics: information privacy, physical privacy, and religious objections Woodward et al. (2001): Information privacy Some concerns were identified such the concern about the tracking and misuse of data, especially within web environment (Prabhakar, et al., 2003). Physical privacy Several biometrics have a certain stigma attached to them and can avoid individuals from using the biometrics technology at ease. Fingerprint, for instance, has an undeserved stigma from its association with criminal manners. Religious objections
3 Different countries have different cultures and religious beliefs which rule business and social practices, and persons will be uncertain to adopt practices considered contrary to their cultural or religious dictates(f. Al-Harby, et al., 2009). A TYPICAL BIOMETRIC SYSTEM Any biometric system contains five components (S. Salawadgi, 2014).: 1- A sensor to gather the data and convert the information to a digital format. 2- Signal processing algorithms to achieve quality control activities and progress the biometric template. 3- A data storage element which retains information that new biometric templates will be compared to. 4- A matching algorithm which compares the new biometric template to one or more templates kept in data storage. 5- A decision process which uses the results from the matching component to make a system-level decision. A Biometric system includes three parts: Input Device: such as scanner to record any inputs which are then used by the software part. Biometrics Software: a software processes the input and converts it into digital form, extract the features, and compare all the results. Database: to store the information, which used for evaluation. As well, features extracted from input samples are stored in the database and storing features in the database saves the time for processing. BIOMETRIC PROCESSES Biometric systems depend on some separate processes: enrolment, live capture, template extraction and comparison. The purpose of enrolment is to gather and store biometric samples beside creating numerical templates for any future comparisons. By storing the raw samples, new replacement templates can be generated in the event that a new or updated comparison algorithm is presented to the system. Template extraction needs signal processing of the raw biometric samples (e.g. images or audio samples) to yield a numerical template. Templates are typically generated and stored upon enrolment to secure processing time upon upcoming comparisons. Comparison of two biometric templates applies algorithmic computations to measure their likeness. At comparison level, a match score is allocated. If it is above a specified threshold, the templates are considered a match. For better recognition rate, multiple samples for each individual are gathered through registration. At the verification step, similar set of features which have been extracted through enrolment process are extracted from the input samples scanned or recorded using input devices, to form the feature vectors. Verification is 1 to 1 matching. Within verification, the individual claims his or her identity which is confirmed by comparing these feature
4 vectors by the feature vectors of the individual which he or she claimed to be. If the matching rate crosses the threshold then the system will validate the individual as authentic user, or the individual will be rejected (S. Salawadgi, 2014). Likewise, for the identification similar set of features which have been extracted during enrolment process are extracted from the input samples scanned or recorded using input devices, to form the feature vectors. Identification is 1 to n matching. The feature vectors of the individual are compared with the feature vectors of every individual stored in the database. If the highest matching score crosses the threshold, at that time it identifies the individual as the person whose similar rate is the highest ( M.L. Gavrilova, 2014). Fig. 2. Biometric System Architecture (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA) PERFORMANCE The accuracy of a biometric system is typically measured mostly by a receiver operating characteristic, or ROC curve plot which represent its false match rate (FMR) and false non-match rate (FNMR) counter to some biometric sample gallery. While FMR is the frequency with which biometric samples from diverse sources are incorrectly evaluated to be from the matching source, FNMR is the frequency with which samples from the exact source are erroneously assessed to be from different sources (Aware, 2014).
5 Fig. 3. An ROC curve for a given biometric matching system and dataset. (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA). Typically, a well-performing biometric system is characterized by prompt results and low rates of FMR and FNMR. The accuracy of a system falls on a point on the ROC curve whose location is a function of the matching threshold applied. A higher match threshold reduces false match rate but increases false non-match rate (higher security, lower convenience). As well, a lower match threshold reduces the false non-match rate but increases false match rate (higher convenience, lower security). Higher quantities of data (e.g. more fingerprints) and higher-quality (highly consistent) samples are required for one-to-many search processes as compared to one-to-one matching for authentication (Aware, 2014). Fig. 4. Density functions of comparison scores between a) samples from different sources and b) samples from the same sources, illustrating FMR and FNMR. (Source: Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA).
6 STATE-OF-THE ART METHODOLOGY The state-of-the art methodology for biometric authentication involves of: Appearance based and feature methods for recognizing and comparing similar patterns in different user s biometric data ( S. Yanushkevich, et al., 2007). Dimensionality-reduction techniques for extracting and learning the most important biometric characteristic, for example, Principal Component Analysis (PCA), k-mean clustering and Chaotic Neural Networks ( Y. Tian, et al., 2012). Novel decision-making techniques based on information fusion, Markov chains, fuzzy logic, and cognitive informatics (M. Gavrilova, et al., 2013). Researchers argues for the use of multi-modal biometric system rather than the single biometric method (M. Monwar, et al., 2009). It has been well recognized during the last decade that individual biometrics have a number of lacks, together with issues of universality, uniqueness, poor sample quality, human error and changes over time. Due to the fact that multimodal biometric system can integrate two or more individual biometric characters, the overall system recognition rate can rise significantly. This issue remains accurate even in the presence of erroneous, incomplete or missing data. EMERGING METHODOLOGY Recently, three new approaches have been presented to biometric technology with implications for Cyberworld security problems: Discovering the capabilities of multi-modal biometric fusion methods within the setting of Cyberworld user identity recognition (M. Gavrilova, et al., 2011). Enhancing a set of metrics for classifying abnormal user behaviours through recognition of their physiological and behavioural traits ( S. Yanushkevich, et al., 2007). Presenting the concept of biometric cancellability in the framework of Cyberworld authentication (P. Paul, et al., 2012) These new approaches will offer a strong and unique methodology for improving user security via on-line societies. CHALLENGES Nowadays, new research continues to develop every day in the biometric authentication field; nevertheless, some challenges remain that are both essential and precise to Cyberworld. The recent issues facing the biometric authentication domain are ( M.L. Gavrilova, 2014): Further effective methods for intruder detection and prevention. Requirement for better privacy policies to protect user confidentiality. In case of changes in databases over time might need more advance training methods. Capability to use appropriate information gained in parallel to main biometric features.
7 Challenges with big data that request real-time performance with high recognition rates on very large data sources. FUTURE RESEARCH DIRECTIONS It is important to realise that other important issues may remain open for investigation such as ( M.L. Gavrilova, 2014): Recognition of normal vs abnormal on-line user behaviour over progressive pattern analysis of appearance-based and behavioural biometrics (typing patterns, voice, blogs). Examining on-line social network activities as new type of biometric traits, i.e. social biometrics (such as: Twitter, Facebook and LinkedIn). Emerging research into spatio-temporal biometrics for e-communities. Considering mechanism that contribute to generating effective on-line communities; Learning leadership and common personality traits in Cyberworld. Although work on some of the problems listed above has started, most of them continue untouched and present forthcoming research directions in the domain of biometric authentication. REFERENCES AL-Harby, F., Qahwaji, R., & Kamala, M. (2013). End-Users Acceptance of Biometrics Authentication to Secure E-Commerce within the Context of Saudi Culture: Applying the UTAUT Model. In I. Management Association (Ed.), IT Policy and Ethics: Concepts, Methodologies, Tools, and Applications (pp ). Hershey, PA: Information Science Reference. doi: / ch061 AL-Harby, F., Qahwajim, R., & Kamala, M. (2012). Towards an Understanding of User Acceptance to Use Biometrics Authentication Systems in E-Commerce: Using an Extension of the Technology Acceptance Model. In I. Lee (Ed.), Transformations in E-Business Technologies and Commerce: Emerging Impacts (pp ). Hershey, PA: Business Science Reference. doi: / ch007 Al-Harby F., R Qahwaji, and M Kamala, The effects of gender differences in the acceptance of biometrics authentication systems within online transaction, CYBERWORLD 2009, Published by IEEE computer society pp , September 7 11, 2009, UK AL-Harby F., R Qahwaji, & M Kamala, Users Acceptance of Secure Biometrics Authentication System: Reliability and Validate of an Extended UTAUT Model. The Second International Conference on Networked Digital Technologies (NDT 2010), Springer Lecture Notes in Computer Science.
8 Ashbourn, J. (2000). Biometrics: Advanced identity verification: The complete guide. London: Springer. Aware, Inc. What Are Biometrics? Research Paper (2014) Bedford, MA. Jain, A. (2004). Biometric recognition: How do I know who you are? Paper presented at the Signal Processing and Communications Applications Conference Proceedings of the 12th IEEE. Jain, A., Hong, L., & Pankanti, S. (2000). Biometric identification. Communications of the ACM, 43(2), M.L. Gavrilova, Biometric-Based Authentication for Cyberworld Security: Challenges and Opportunities, University of Calgary June, 2014 M Gavrilova and R Yampolskiy Applying biometric principles to avatar recognition Transactions on computational science XII, , 2011 M. Gavrilova and M. Monwar Multimodal Biometrics and Intelligent Image Processing for Security Systems, IGI, book, 2013 M. Monwar and M. Gavrilova, Multimodal Biometric System Using Rank-Level Fusion Approach, IEEE Trans. on System, Man and Cybernetics, pp , vol. 39, no. 4, 2009 P. Paul and M. Gavrilova Multimodal Cancellable Biometric, 10th Int C on Cognitive Informatics & Cognitive Computing ICCI*CC 2012, IEEE, 43-50, Prabhakar, S., S. Pankanti, S., & Jain, A. K. (2003). Biometrics recognition: Security and privacy concerns. IEEE Security & Privacy, 1(2), Sarita Salawadgi, Biometrics: A Security Tool for 21 st Century, International Journal of Innovation and Applied Studies, vol. 8, no. 2, pp , September 2014 S. Yanushkevich, M. Gavrilova, P. Wang and S. Srihari, Image Pattern Recognition: Synthesis and Analysis in Biometrics, World Scientific Publishers, book, 2007 Y. Tian, Y. Wang, M. Gavrilova and G. Ruhe, A Formal Knowledge Representation System for the Intelligent Knowledge Base of a Cognitive Learning Engine, Int. J. of Software Science and Computational Intelligence IJSCCI, IGI, 1-17, Woodward, J. D., Webb, K. W., Newton, E. M., Bradley, M., & Rubenson, D. (2001). Army biometric applications: RAND Corporation. Zhang, D. (2000). Automated Biometrics: Technologies and Systems Norwell, MA: Kluwer Academic Publishers.
Biometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationBiometrics Acceptance - Perceptions of Use of Biometrics
Association for Information Systems AIS Electronic Library (AISeL) ACIS 2004 Proceedings Australasian (ACIS) December 2004 Biometrics Acceptance - Perceptions of Use of Biometrics Angela Chau University
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationUNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT
UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationIJRASET 2015: All Rights are Reserved
A Novel Approach For Indian Currency Denomination Identification Abhijit Shinde 1, Priyanka Palande 2, Swati Kamble 3, Prashant Dhotre 4 1,2,3,4 Sinhgad Institute of Technology and Science, Narhe, Pune,
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationContent Based Image Retrieval Using Color Histogram
Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationAssessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies
Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations
More informationFEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos
FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA
ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationOffice hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.
Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationAn Enhanced Biometric System for Personal Authentication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication
More informationUser Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationInvestigation of Recognition Methods in Biometrics
Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationIris based Human Identification using Median and Gaussian Filter
Iris based Human Identification using Median and Gaussian Filter Geetanjali Sharma 1 and Neerav Mehan 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 456-461
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationIntegrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence
Integrated Digital System for Yarn Surface Quality Evaluation using Computer Vision and Artificial Intelligence Sheng Yan LI, Jie FENG, Bin Gang XU, and Xiao Ming TAO Institute of Textiles and Clothing,
More informationFACE VERIFICATION SYSTEM IN MOBILE DEVICES BY USING COGNITIVE SERVICES
International Journal of Intelligent Systems and Applications in Engineering Advanced Technology and Science ISSN:2147-67992147-6799 www.atscience.org/ijisae Original Research Paper FACE VERIFICATION SYSTEM
More informationACADEMIC YEAR
INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More informationTowards affordance based human-system interaction based on cyber-physical systems
Towards affordance based human-system interaction based on cyber-physical systems Zoltán Rusák 1, Imre Horváth 1, Yuemin Hou 2, Ji Lihong 2 1 Faculty of Industrial Design Engineering, Delft University
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationAuthentication Using Pulse-Response Biometrics
Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit
More informationMalaviya National Institute of Technology Jaipur
Malaviya National Institute of Technology Jaipur Advanced Pattern Recognition Techniques 26 th 30 th March 2018 Overview Pattern recognition is the scientific discipline in the field of computer science
More informationExploring HowUser Routine Affects the Recognition Performance of alock Pattern
Exploring HowUser Routine Affects the Recognition Performance of alock Pattern Lisa de Wilde, Luuk Spreeuwers, Raymond Veldhuis Faculty of Electrical Engineering, Mathematics and Computer Science University
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More information1. First printing, TR , March, 2000.
MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationISSUANCE AND CIVIL REGISTRATION
IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationModern Biometric Technologies: Technical Issues and Research Opportunities
Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric
More informationLabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System
LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a
More informationProceedings of the 2014 Federated Conference on Computer Science and Information Systems pp
Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationRESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS
RESEARCH AND DEVELOPMENT OF DSP-BASED FACE RECOGNITION SYSTEM FOR ROBOTIC REHABILITATION NURSING BEDS Ming XING and Wushan CHENG College of Mechanical Engineering, Shanghai University of Engineering Science,
More informationIRIS RECOGNITION USING GABOR
IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition
More informationApplied Surveillance using Biometrics on Agents Infrastructures
Applied Surveillance using Biometrics on Agents Infrastructures Manolis Sardis, Vasilis Anagnostopoulos, Nikos Doulamis National Technical University of Athens, Department of Telecommunications & Software
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationBiometrical verification based on infrared heat vein patterns
Proceedings of the 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015 Biometrical verification based on infrared heat vein patterns Elnaz Mazandarani a, Kaori Yoshida b,
More informationSketch Matching for Crime Investigation using LFDA Framework
International Journal of Engineering and Technical Research (IJETR) Sketch Matching for Crime Investigation using LFDA Framework Anjali J. Pansare, Dr.V.C.Kotak, Babychen K. Mathew Abstract Here we are
More informationPerformance Analysis of Multimodal Biometric System Authentication
290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute
More informationAn Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander
More informationSession 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)
Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation
More informationImpact of Resolution and Blur on Iris Identification
100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract
More informationUser Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno
CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationA COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES
A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES Ramandeep Chahal Department of CSE GVIET, Banur, Punjab, India ABSTRACT Biometric is the science for recognizing an individual on the basis of his or
More informationFingerprint Combination for Privacy Protection
Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract
More informationInternational Journal of Engineering and Emerging Technology, Vol. 2, No. 1, January June 2017
Measurement of Face Detection Accuracy Using Intensity Normalization Method and Homomorphic Filtering I Nyoman Gede Arya Astawa [1]*, I Ketut Gede Darma Putra [2], I Made Sudarma [3], and Rukmi Sari Hartati
More informationNotes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.
Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit
More informationAuto-tagging The Facebook
Auto-tagging The Facebook Jonathan Michelson and Jorge Ortiz Stanford University 2006 E-mail: JonMich@Stanford.edu, jorge.ortiz@stanford.com Introduction For those not familiar, The Facebook is an extremely
More informationThis list supersedes the one published in the November 2002 issue of CR.
PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.
More informationMachinery Prognostics and Health Management. Paolo Albertelli Politecnico di Milano
Machinery Prognostics and Health Management Paolo Albertelli Politecnico di Milano (paollo.albertelli@polimi.it) Goals of the Presentation maintenance approaches and companies that deals with manufacturing
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationOnline Diagnosis and Monitoring for Power Distribution System
Energy and Power Engineering, 1,, 59-53 http://dx.doi.org/1.3/epe.1. Published Online November 1 (http://www.scirp.org/journal/epe) Online Diagnosis and Monitoring for Power Distribution System Atef Almashaqbeh,
More informationFuzzy-Heuristic Robot Navigation in a Simulated Environment
Fuzzy-Heuristic Robot Navigation in a Simulated Environment S. K. Deshpande, M. Blumenstein and B. Verma School of Information Technology, Griffith University-Gold Coast, PMB 50, GCMC, Bundall, QLD 9726,
More informationSecond Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security
Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS
More informationThe total manufacturing cost is estimated to be around INR. 12
Intelligent Integrated Home Security System Using Raspberry Pi Pallavi Mitra Department of Electronics and Communication Engineering,National Institute of Technology,Durgapur E-mail: pallavi08091992@gmail.com
More informationBiometrics. Duane M. Blackburn Federal Bureau of Investigation
0 3 / 0 4 Biometrics Duane M. Blackburn Federal Bureau of Investigation 101 V e r s i o n 3. 1 Biometrics 101 1 Version 3.1 March 2004 Duane M. Blackburn 2 Federal Bureau of Investigation 3 1.0 Introduction
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More informationEnhanced MLP Input-Output Mapping for Degraded Pattern Recognition
Enhanced MLP Input-Output Mapping for Degraded Pattern Recognition Shigueo Nomura and José Ricardo Gonçalves Manzan Faculty of Electrical Engineering, Federal University of Uberlândia, Uberlândia, MG,
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationNear Infrared Face Image Quality Assessment System of Video Sequences
2011 Sixth International Conference on Image and Graphics Near Infrared Face Image Quality Assessment System of Video Sequences Jianfeng Long College of Electrical and Information Engineering Hunan University
More informationKeywords: Fuzzy Logic, Biometric, Fingerprint Sensor, Automation Teller Machine, Security
REPRESENTATION OF COMPOUND METHODS OF FINGER AND INDIVIDUAL SPECIFICATION FROM FUZZY LOGIC FOR INCREASE THE SECURITY AND RECOGNITION OF USER IDENTIFY IN AUTOMATION TELLER MACHINE Zainab Moradyan, Mohsen
More informationFacial Recognition of Identical Twins
Facial Recognition of Identical Twins Matthew T. Pruitt, Jason M. Grant, Jeffrey R. Paone, Patrick J. Flynn University of Notre Dame Notre Dame, IN {mpruitt, jgrant3, jpaone, flynn}@nd.edu Richard W. Vorder
More informationPerformance study of Text-independent Speaker identification system using MFCC & IMFCC for Telephone and Microphone Speeches
Performance study of Text-independent Speaker identification system using & I for Telephone and Microphone Speeches Ruchi Chaudhary, National Technical Research Organization Abstract: A state-of-the-art
More informationBIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY
BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the
More informationISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique
TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More information