BIOMETRIC TECHNOLOGIES AND APPLICATIONS

Size: px
Start display at page:

Download "BIOMETRIC TECHNOLOGIES AND APPLICATIONS"

Transcription

1 BIOMETRIC TECHNOLOGIES AND APPLICATIONS Patrick S. P. Wang Northeastern University Boston, MA, USA Svetlana N. Yanushkevich Biometric Technology Laboratory University of Calgary Calgary, Alberta, Canada ABSTRACT Biometric technologies focus on the verification and identification of humans using their possessed biological (anatomical, physiological and behavioral) properties. This paper overview current advances in biometric technologies, as well as some aspects of system integration, privacy and security and accompanying problems such as testing and evaluation. KEY WORDS Biometrics, intelligent systems, security, image processing, pattern recognition. 1 Introduction Biometric technology may be defined as the automated use of physiological or behavioral characteristics to determine or verify an individual s identity. The word biometric also refers to any human physiological or behavioral characteristic which possesses the requisite biometric properties [1,2]. They are: Universal (every person should have that characteristic), Unique (no two people should be exactly the same in terms of that characteristic), Permanent (invariant with time), Collectable (can be measured quantitatively), Reliable (must be safe and operate at a satisfactory performance level), Acceptable (non-invasive and socially tolerable), and Non-circumventable (how easily the system is fooled into granting access to impostors). Biometric technologies attempt to generate computer models of the physical and behavioural characteristics of human beings with a view to reliable personal identification. The above characteristics include visual images and other human phenomena such as speech, gait, odour, DNA, and indeed anything at all which might help to uniquely identify the individual. Biometric technologies are usually thought as implementation of pattern recognition algorithms, since it is aimed at identifying humans. It, therefore, adapts methods and algorithms from computer vision, but it is not restricted to visual images. Recently, the other direction of the biometrics, namely biometric synthesis, has obtain more attention. Synthesis, or rendering biometric phenomena from their corresponding computer models, is somewhat opposite to identification, which require signal processing with the purpose of featuring the models used for recognition. However, we could generate a synthetic face from its corresponding computer model. Such a model could include muscular dynamics to model facial expressions. In Table 1, the basic terminology of synthetic biometrics is given. In particular, the term face reconstruction indicates a class of problems aimed at synthesizing a model of a static face. The term mimics animation is defined as the process of modeling facial appearance and facial topology, a behavioral characteristic called facial expression, the visible result of synthetic emotion. 2 Direct Biometrics The term direct biometrics refer to traditional human recognition methods. The most recent development and applications of biometric technologies largely rely on the fundamental definition of pattern matching, which require learning (analysis) and recognition (synthesis). The significant progress have been achieved in this area since developing the computer-aided tools for signal (images, audio signal and other) processing, analysis and pattern recognition systems [3]. 2.1 Biometric data analysis and pattern recognition The problem of analysis of biometric information has long been investigated. Many researchers have provided efficient solutions for human authentication based on signature, fingerprints, facial characteristics, hand geometry, keystroke analysis, ear, gait, iris and retina scanning. Active research is being conducted using both traditional and emerging technologies, to find better solutions to the problems of verification where claimants are checked against their specific biometric records in a database, and identification where a biometric database is searched to see if a particular candidate can be matched to any record. Detailed descriptions and analysis of the principles, methods, technologies, and core ideas used in biometric authentication systems can be found in [2,4]. It explains the definition and measurement of performance and examines the factors involved in choosing between different biometrics. It also delves into practical applications and covers the parameters critical for successful system integration:

2 Table 1. Direct and inverse problems of biometric technology. DIRECT PROBLEM INVERSE PROBLEM Signature identification Signature forgery Handwriting character recognition Handwritten text forgery face recognition Face reconstruction and mimics animation Voice identification and speech recognition Voice and speech synthesis Iris and retina identification Iris and retina image synthesis Fingerprint identification Fingerprint imitation hand geometry identification Hand geometry imitation Infrared identification infrared image reconstruction Gait identification Gait modeling Ear identification Ear-print imitation recognition accuracy, total cost of ownership, acquisition and processing speed, intrinsic and system security, privacy and legal requirements, and user acceptance. 2.2 Multimodal biometrics Through rapid advancements and developments of past years, there have been tremendous achievements have been reach in improvement of reliability of recognition. For example, there have been developed character recognition methods that can reach as high as almost 99.99% accuracy rate [3]. However, real-life environments pose significant difficulties on biometric-based recognition systems. To increase overall reliability, the contemporary biometric systems measure multiple physiological or behavioral traits. This approach is called multimodal biometrics (see Handbook of Multibiometrics [5]. The most often multi-biometric data, employed in the biometric systems, include iris and retina of the eye, fingerprint, geometry and palmprint of the hand, and also face and ears. For example, face geometry is a highly dynamic but reach topological structure (smile, lip, brow, and eye movements). Combining facial images with more static biometric such as fingerprint, is an example of the concept of multibiometrics. The multimodal human recognition is deployed in physical access security systems and other areas such as banking systems [1,5,6]. 2.3 Fingerprints Fingerprint is, perhaps, the oldest type of biometrics, used in ancient world. The most popular utilization example of fingerprints is forensic investigations [7]. Today s fingerprint readers is the most developed type of biometric sensors. 2.4 Signatures Current interest in signature analysis is motivated by the development of improved devices for human-computer interaction which enable input of handwriting and signatures [8,9]. 2.5 Faces Face recognition systems detect patterns, shapes, and shadows in the face, perform feature extraction and recognition of facial identity. In the broader view, it include all types of facial processing such as tracking, detection, analysis and synthesis. The most popular approach is based on eigenfaces, that represent the differences between the face under recognition and the enrolled ones in the database. The principlecomponent analysis using higher-order statistics is the underlying mathematics for this facial pattern recognition. Many biometric systems are confused when identifying the same person smiling, aged, with various accessories (moustache, glasses), and/or in badly lit conditions. For robustness of recognition, advanced techniques such as morphable models and expression-invariant face representation methods. On the other hand, facial recognition tools can be improved by training on a set of synthetic facial expressions and appearance/environment variations generated from real facial images [10,11]. The most advance on-going research in this area is devoted to understanding of how humans can routinely perform robust face recognition, in order to improve machine recognition of human faces. This research is relevant to computer vision paradigm. A comprehensive references to the current state-of-the-art approaches to face processing can be found in [12]. 2.6 Iris and retina Iris recognition systems scan the surface of the iris to compare patterns. It was Daugman who first introduced socalled Daugman code to represent an iris pattern. The iris biometrics is considered to be the most reliable one, as the plots for comparing the hamming distances for 9.1 million iris comparisons to the Beta-binomial distribution showed that the data fit the distribution remarkably well

3 [11]. Retina recognition systems scan the surface of the retina and compare nerve patterns, blood vessels and such features. Various model of the iris, retina, and eye have been used to improve recognition, and can be found in [14-16]. 2.7 Gait biometrics Gait recognition is defined as the identification of a person through the pattern produced by walking [6,17]. The potential of gait as a biometric was encouraged by the considerable amount of evidence available, especially in biomechanics literature [19,20]. A unique advantage of gait as biometrics is that it offers potential for recognition at a distance or at low resolution, when other biometrics might not be perceivable. As gait is behavioural biometrics there is much potential for within-subject variation [21]. This includes footwear, clothing and apparel. Recognition can be based on the (static) human shape as well as on movement, suggesting a richer recognition cue. Model-based techniques use the shape and dynamics of gait to guide the extraction of a feature vector. Gait signature derives from bulk motion and shape characteristics of the subject, articulated motion estimation using an adaptive model and motion estimation using deformable contours. 2.8 Other biometrics A variety of biometrics such as ear geometry [22], odour, electrocardiogram, keystroke dynamics [1,5] and other other physiological and behavioral characteristics are being investigated to be deployed for human authentication. 3 Inverse Biometrics Synthetic biometrics offer the ways to improve reliability of the biometric-based systems. It can be accomplished by providing variations on biometric data mimicking unavailable or hard to access data (for example, modeling of badly lit faces, noisy iris images, wet fingerprints etc.) Such an artificial biometric data are understood as biologically meaningful data for existing biometric systems [23,24]. Synthetic data can also be used for spoofing biometric devices with forged data. Summarizing, synthetic biometric data can: Improve the performance of existing identification systems. This can be accomplished by using automatically generated biometric data to create statistically meaningful sets of data variations (appearance, environmental, and others, including forgeries ). Improve the robustness of biometric devices by modeling the strategies and tactics of forgery. Improve the efficiency of training systems by providing the user-in-training with the tools to model various conditions of biometric data acquisition (non-contact such as passive surveillance, contact, cooperative, noncooperative), environmental factors (light, smog, temperature), appearance (aging, camouflage). Therefore, synthetic biometric data plays an important role in enhancing the security of biometric systems. Traditionally, security strategies (security levels, tools, etc.) are designed based on assumptions about a hypothetical robber or forger. Properly created artificial biometric data provides for detailed and controlled modeling of a wide range of training skills, strategies and tactics, thus enabling a better approach to enhancing the system s performance. This study aims to develop new approaches for the detection of attacks on security systems. The tools for analysis and recognition (direct biometrics) of human characteristics have their analogs in the synthesis (Figure 1. RECOGNITION AND IDENTIFICATION OF BIOMETRIC DATA BEHAVIORAL PHYSICAL MODELS VISIBAL BAND IR BAND ACOUSTIC BAND DISTANCE NEAR DISTANCE CONTACT MODELS KNOWLEDGE DOMAIN SIGNAL DOMAIN REPRESENTATION NON- CORRELATED CORRELATED DATA SYNTHETIC BIOMETRIC DATA GENERATION Figure 1. Analysis-by-synthesis approach in facial image. The crucial point of modeling in biometrics is the analysis-by-synthesis paradigm. This paradigm states that synthesis of biometric data can verify the perceptual equivalence between original and synthetic biometric data, i.e., synthesis based feedback control. For example, facial analysis can be formulated as deriving a symbolic description of a real facial image. The aim of face synthesis is to produce a realistic facial image from a symbolic facial expression model [25]. 3.1 Synthetic fingerprints Albert Wehde was the first to forge fingerprints in the 1920 s. Wehde designed and manipulated the topology of synthetic fingerprints at the physical level. The forgeries

4 were of such high quality that professionals could not recognize them. Today s interest in automatic fingerprint synthesis addresses the urgent problems of testing fingerprint identification systems, training security personnel, biometric database security, and protecting intellectual property. Cappelli et al. [26] developed a commercially available synthetic fingerprint generator called SFinGe. Kuecken [27] developed a method for synthetic fingerprint generation based on natural fingerprint formation and modeling based on state-of-the-art dermatoglyphics. Many biometric systems are confused when identifying the same person smiling, aged, with various accessories (moustache, glasses), and/or in badly lit conditions (Fig. 2). Facial recognition tools can be improved by training on a set of synthetic facial expressions and appearance/environment variations generated from real facial images. 3.2 Synthetic signatures The simplest method of generating synthetic signatures is based on geometrical models [28 30]. Spline methods and Bezier curves are used for curve approximation, given some control points. The following evaluation properties are distinguished for synthetic signatures [31]: statistical, kinematical (pressure, speed of writing, etc.), geometric, also called topological, and uncertainty (generated images can be intensively infected by noise) properties. A model based on combining shapes and physical models in synthetic handwriting generation has been developed in [32]. The so-called delta-log normal model was developed in [9]. This model can produce smooth connections between characters, but can also ensure that the deformed characters are consistent with the models. In [33], it was proposed to generate character shapes by Bayesian networks. By collecting handwriting examples from a writer, a system learns the writers writing style. 3.3 Synthetic retina and iris images Iris pattern painting has been used by ocularists in manufacturing glass eyes or contact lenses for sometime. The ocularist s approach to iris synthesis is based on the composition of painted primitives, and utilized layered semitransparent textures built from topological and optic models [34]. These methods are widely used by today s ocularists: vanity contact lenses are available with fake iris patterns printed onto them (designed for people who want to change eye colors). Other approaches include image processing and synthesis techniques such as PCA combined with super-resolution [35], and random Markov field [36]. In [37], a cancelable iris image design is proposed for the problem as follows. The iris image is intentionally distorted to yield a new version. For example, a simple permutation procedure is used for generating a synthetic iris. An alternative approach is based on generation of iris layer patterns [31]. 3.4 Synthetic faces Face recognition systems detect patterns, shapes, and shadows in the face. The reverse process - face reconstruction - is a classical problem of criminology. Figure 2. Modeling of facial accessories, aging, drunk, and a badly lit faces. Usage of databases of synthetic faces in a facial recognition context has been reported in [38]. 3.5 Usage of synthetic biometrics The commercially available synthetic fingerprints generator [26] has been used, in particular, in the Fingerprint Verification Test competition since An example of a tool used to create databases for fingerprints is SFinGe, developed at the University of Bologna ( The generated databases were entered in the Fingerprint Verification Competition FVC2004 and performed just as well as real fingerprints [39]. 3.6 Cancelable biometrics The issue of protecting privacy in biometric systems has inspired the area of so-called cancelable biometrics. It was first initiated by the Exploratory Computer Vision Group at IBM T.J. Watson Research Center and published in [37]. Cancelable biometrics aim to enhance the security and privacy of biometric authentication through generation of deformed biometric data, i.e. synthetic biometrics. Instead of using a true object (finger, face), the fingerprint or face image is intentionally distorted in a repeatable manner, and this new print or image is used. If, for some reason, the old print or image is stolen, an essentially new print can be issued by simply changing the parameters of the distortion process. This also results in enhanced privacy for the user since his true print is never used anywhere, and different distortions can be used for different types of accounts. 3.7 Biometric data model validation Data generated by various models are classified as acceptable or unacceptable for further processing and use in var-

5 ious applications. The application-specific criteria must provide a reasonable level of acceptability. Acceptability is defined as a set of characteristics which distinguish original and synthetic data. A model that approximates original data at reasonable levels of accuracy for the purpose of analysis is not considered a generator of synthetic biometric information. Artificial biometric data must be verified for their meaningfulness. Statistical model verification is accomplished by solving the equations that describe physicsbased models, and obtaining the correct values. Model validation must prove if the equations that describe the model are right. Comparing the statistical distributions of real biometrics to the statistical distributions from empirical and physics-based models for a wide range of operational conditions validates these models for the range of conditions provided by the real biometric samples [40]. A simple method for validating these distributions is via visual comparison of overlapped distributions. The MITRE research project [23] used synthetically generated faces to better understand the performance of face recognition systems. If a person s photo in the system s database was taken 10 years ago, is it possible to identify the person today? A pose experiment was also conducted with synthetic data to isolate and measure the effect of camera angle in one-degree increments. The modeling technique will provide an effective, more structured basis for risk management in a large biometric system. This will help users choose the most effective systems to meet their needs in the future. 3.8 Ethical and social aspects of inverse biometrics Ethical and social aspects of inverse biometrics include several problems, in particular, the prevention of undesirable side-effects, and targeting of areas of social concern in biometrics. Prevention of undesirable side effects aims at studying the potential negative impacts of biometrics, as far as important segments of society are concerned, and how can these be prevented. The undesirable ethical and social effects of the solutions of inverse biometrics have not been studied yet. However, it is possible to predict some of them. The particular examples of negative impact of synthetic biometrics are as follows: Synthetic biometric information can be used not only for improving the characteristics of biometric devices and systems, but also can be used by forgers to discover new strategies of attack. Synthetic biometric information can be used for generating multiple copies of original biometric information. 4 Conclusions The concept of inverse biometrics arose from the analysisby-synthesis paradigm, and has become an integral part of the modeling and simulation of human biometrics in many applications. Data generated by various models are used as databases (for example, databases of synthetic fingerprint) of synthetic biometrics for testing biometric hardware and software. The other application is biometric-based decision making support systems for security, banking, and forensic applications. A generator of synthetic biometric information (for example, an aging or surgically changed face), is a vital component of such systems. Yet another recently emerging application is the creation of simulators for training highly qualified personnel in biometric-based physical access control systems such as airport gates, hospital registration, and others. The ability to increase the reliability and accuracy of these systems while probing their vulnerabilities under numerous environmental conditions is critical, as biometrics becomes an essential part of law enforcement and security communities. Acknowledgment This paper was prepared while Dr. P.S.P. Wang was the icore Visiting Professor in the University of Calgary, Canada. His visit was supported by icore, the Informatics Circle of Research Excellence, the province of Alberta, Canada. Dr. Yanushkevich acknowledges the Canadian Foundation for Innovations (CFI) and the National Science and Engineering Research Council of Canada, for funding the equipment and researchers in the Biometric Technologies Laboratory ( University of Calgary. References [1] A. Jain, R. Bolle, and S. Pankanti, Eds., Biometrics: Personal Identification in a Networked Society, Kluwer, 1999 [2] R. Bolle, J. Connell, S. Pankanti, N. Ratha, and A. Senior, Guide to Biometrics, Springer, 2004 [3] C. Chen, and P. Wang, Eds. Handbook of Pattern Recognition and Computer Vision, World Scientific Publishers, 2005 [4] J. Wayman, A. Jain, D. Maltoni, and D. Maio, Eds. Biometric Systems Technology, Design and Performance Evaluation, Spinger, [5] A. Ross, K. Nandakumar, and A. Jain Handbook of Multibiometrics, International Series on Biometrics Springer, 6, [6] V. Shmerko, Phil Phillips, G. Kukharev, W. Rogers, and S. Yanushkevich, Biometric Technologies, Proc. Int. Conf. The Biometrics: Fraud Prevention, Enchanced Service, Las Vegas, Nevada, , 1997 [7] S. A. Cole, Suspect Identities A History of Fingerprinting and Criminal Identification, Harvard University Press, 2001 [8] J. M. Hollerbach, An oscilation theory of handwriting, Biological Cybernetics, 39, , [9] R. Plamondon, and W. Guerfali, The generation of handwriting with delta-lognormal synergies, Bilogical Cybernetics, 78, pp , 1998

6 [10] P. Ekman, and E. L. Rosenberg, Eds. What the Face Reveals: Basic and Applied Studues of Spontaneouse Expression Using the Facial Action Coding System (FACS) Oxford University Press, 1997 [11] M. Pantic, and L. J. M. Rothkrantz, Automatic analysis of facial expressions: the state-of-the-art, IEEE Trans. Pattern Analysis and Machine Intelligence, 22, 12, pp , 2000 [12] W. Zhao, R. Chelappa, Eds., Face Processing: Advanced Modeling and Methods, Elsevier, 2006 [13] J. Daugman, The importance of being random: Statistical principles of iris recognition, Pattern Recognition, 36(2), pp , 2003 [14] A. Can, C.V. Steward, B. Roysam, and H. L. Tanenbaum, A feature-based, robust, hierarchical algorithm for registering pairs of images of the curved human retina, IEEE Trans. Analysis and Machine Intelligence, 24(3), , 2002 [15] T. Moriyama, J. Xiao, T. Kanade, and J. F. Cohn, Meticulously Detailed Eye Model and its Application to Analysis of Facial Image. Proc. IEEE Int. Conf. Systems, Man, and Cybernetics, , 2004 [16] C. Sanchez-Avila, and R. Sanchez-Reillo, Irisbased biometric recognition using dyadic wavelet transform, IEEE Aerospace and Electronic Systems Magazine, October, 3 6, 2002 [17] D. Cunado, M.S. Nixon, and J.N. Carter, Automatic extraction and description of human gait models for recognition purposes, Computer Vision and Image Understanding, 9(1), 1 14, 2003 [18] M.S. Nixon, J.N. Carter, M.G. Grant, L. Gordon, and J.B. Hayfron-Acquah, Automatic recognition by gait: progress and prospects, Sensor Review, 23(4), , 2003 [19] L. Sloman, M. Berridge, S. Homatidis, D. Dunter, and T. Duck, Gait patterns of depressed patients and normal subjects, American Journal of Psyhiatry, 139(1), 94 97, 1982 [20] I.P.I. Pappas, M.R. Popovic, T. Keller, V. Dietz, and M. Morari, A reliable gait phase detection system, IEEE Transaction on Neural System Rehabilitation Engineering, June, 9(2), , 2001 [21] N. V. Boulgouris, D. Hatzinakos, and K. N. Plataniotis, Gait recognition: A challening signal processing technology for biometric identification, IEEE Signal Processing Magazine, November, 78 90, [22] D. J. Hurley, M. S. Nixon, and J. N. Carter, Force field feature extraction for ear biometrics, Computer Vision and Image Understanding, 98, , 2005 [23] N. M. Orlans, D.J. Buettner, and J. Marques, A Survey of Synthetic Biometrics: Capabilities and Benefits, Proc. Int. Conf. Artificial Intelligence, CSREA Press, vol. I, , 2004 [24] S. N. Yanushkevich, A. Stoica, S. N. Srihari, V. P. Shmerko, and M. L. Gavrilova, Simulation of Biometric Information: The New Generation of Biometric Systems, In Proc. Int. Workshop Modeling and Simulation in Biometric Technology, Calgary, Canada, 87 98, 2004 [25] Y. Luo, M. L. Gavrilova, M. C. Sousa, J. Pivovarov, and S. Yanushkevich, Morphing Facial Expressions from Artistic Drawings, In T. Simos, G. Maroulis, Eds., Advanced in Computational Methods in Sciences and Engineering. Lecture Series on Computer and Computational Sciences, Brill Academic Publishers, The Netherlands, Vol. 4, , 2005 [26] R. Cappelli, Synthetic fingerprint generation, In D. Maltoni, D. Maio, A. K. Jain, and S. Prabhakar, Eds., Handbook of Fingerprint Recognition, , Springer, 2003 [27] M. U. Kuecken, and A. C. Newell, A model for fingerprint formation, Europhysics Letters 68(1), , 2004 [28] J. J. Brault, and R. Plamondon, A complexity measure of handwritten curves: modelling of dynamic signature forgery, IEEE Trans. Systems, Man and Cybernetics, 23, , 1993 [29] I. Guyon, Handwriting synthesis from handwritten glyphs, Proc. 5th Int. Workshop Frontiers of Handwriting Recognition, Colchester, UK, , 1996 [30] C. Oliveira, C. Kaestner, F. Bortolozzi, and R. Sabourin, Generation of signatures by deformation, Proc. the BSDIA97, , Curitiba, Brazil, 1997 [31] S. N. Yanushkevich, A. Stoica, V. P. Shmerko, and D.V. Popel, Biometric Inverse Problems, Taylor & Francis/ CRC Press, Boca Raton, FL., 2005 [32] J. Wang, C. Wu, Y. Q. Xu, H. Y. Shum, and L. Li, Learning Based Cursive Handwriting Synthesis, Proc. 8th Int. Workshop Frontiers in Handwriting Recognition, Ontario, Canada, , [33] H. Choi, S. J. Cho, and J. H. Jin Kim, Generation of handwritten characters with bayesian network based on-line handwriting recognizers, In Proc. 17th Int. Conf. Document Analysis and Recognition, Edinburgh, Scotland, , 2003 [34] A. Lefohn, B. Budge, P. Shirley, R. Caruso, and E. Reinhard, An ocularists approach to human iris synthesis, Computer Graphics and Applications, IEEE Magazine, 23(6), 70 75, 2003 [35] J. Cui, Y. Wang, J. Huang, T. Tan, Z. Sun, and L. Ma, An iris image synthesis method based on PCA and superresolution, Proc. Int. Conf. Pattern Recognition, 2004 [36] S. Makthal, and A. Ross, Synthesis of iris images using Markov random fields, Proc. 13th European Signal Processing Conf., Antalya, Turkey, 2005 [37] N. Ratha, J. Connell, and R. Bolle, Enhancing security and privacy in biometrics-based authentication systems, IBM Systems J. 40(3), , 2001 [38] K. Sumi, C. Liu, and T. Matsuyama, Study on Synthetic Face Database for Performance Evaluation, Proc. Int. Conf. Biometric Authentication, , LNCS- 3832, Springer, 2006 [39] The Fingerprint Verification Competition FVC [40] Y. Ma, M. Schuckers, and B. Cukic, Guidelines for appropriate use of simulated data for bio-authentication research, Proc. 4th IEEE Workshop Automatic Identification Advanced Technologies, Buffalo, New York, , 2005

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

1. First printing, TR , March, 2000.

1. First printing, TR , March, 2000. MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the

More information

The Center for Identification Technology Research (CITeR)

The Center for Identification Technology Research (CITeR) The Center for Identification Technology Research () Presented by Dr. Stephanie Schuckers February 24, 2011 Status Report is an NSF Industry/University Cooperative Research Center (IUCRC) The importance

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Human Identifier Tag

Human Identifier Tag Human Identifier Tag Device to identify and rescue humans Teena J 1 Information Science & Engineering City Engineering College Bangalore, India teenprasad110@gmail.com Abstract If every human becomes an

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES

MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES -2018 S.NO PROJECT CODE 1 ITIMP01 2 ITIMP02 3 ITIMP03 4 ITIMP04 5 ITIMP05 6 ITIMP06 7 ITIMP07 8 ITIMP08 9 ITIMP09 `10 ITIMP10 11 ITIMP11 12 ITIMP12 13 ITIMP13

More information

Improved Human Identification using Finger Vein Images

Improved Human Identification using Finger Vein Images Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

A Novel Approach for Human Identification Finger Vein Images

A Novel Approach for Human Identification Finger Vein Images 39 A Novel Approach for Human Identification Finger Vein Images 1 Vandana Gajare 2 S. V. Patil 1,2 J.T. Mahajan College of Engineering Faizpur (Maharashtra) Abstract - Finger vein is a unique physiological

More information

Fingerprint Combination for Privacy Protection

Fingerprint Combination for Privacy Protection Fingerprint Combination for Privacy Protection Mr. Bharat V Warude, Prof. S.K.Bhatia ME Student, Assistant Professor Department of Electronics and Telecommunication JSPM s ICOER, Wagholi, Pune India Abstract

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

An Un-awarely Collected Real World Face Database: The ISL-Door Face Database

An Un-awarely Collected Real World Face Database: The ISL-Door Face Database An Un-awarely Collected Real World Face Database: The ISL-Door Face Database Hazım Kemal Ekenel, Rainer Stiefelhagen Interactive Systems Labs (ISL), Universität Karlsruhe (TH), Am Fasanengarten 5, 76131

More information

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets

Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster) Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation

More information

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a

More information

Introduction to Video Forgery Detection: Part I

Introduction to Video Forgery Detection: Part I Introduction to Video Forgery Detection: Part I Detecting Forgery From Static-Scene Video Based on Inconsistency in Noise Level Functions IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 5,

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

Investigation of Recognition Methods in Biometrics

Investigation of Recognition Methods in Biometrics Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.

More information

Performance Analysis of Multimodal Biometric System Authentication

Performance Analysis of Multimodal Biometric System Authentication 290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS

Journal Title ISSN 5. MIS QUARTERLY BRIEFINGS IN BIOINFORMATICS List of Journals with impact factors Date retrieved: 1 August 2009 Journal Title ISSN Impact Factor 5-Year Impact Factor 1. ACM SURVEYS 0360-0300 9.920 14.672 2. VLDB JOURNAL 1066-8888 6.800 9.164 3. IEEE

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

WE ARE pleased to present 14 papers in this special

WE ARE pleased to present 14 papers in this special IEEE TRANSACTIONS ON SYSTEMS, MAN, AND CYBERNETICS PART B: CYBERNETICS, VOL. 37, NO. 5, OCTOBER 2007 1091 Guest Editorial Introduction to the Special Issue on Recent Advances in Biometric Systems WE ARE

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

A Survey of Synthetic Biometrics: Capabilities and Benefits

A Survey of Synthetic Biometrics: Capabilities and Benefits Accepted for publication in The 2004 International Conference on Artificial Intelligence (IC-AI 04) A Survey of Synthetic Biometrics: Capabilities and Benefits Nicholas M. Orlans The MITRE Corporation

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

Feature Extraction of Human Lip Prints

Feature Extraction of Human Lip Prints Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com

More information

IRIS Recognition Using Cumulative Sum Based Change Analysis

IRIS Recognition Using Cumulative Sum Based Change Analysis IRIS Recognition Using Cumulative Sum Based Change Analysis L.Hari.Hara.Brahma Kuppam Engineering College, Chittoor. Dr. G.N.Kodanda Ramaiah Head of Department, Kuppam Engineering College, Chittoor. Dr.M.N.Giri

More information

Impact of Resolution and Blur on Iris Identification

Impact of Resolution and Blur on Iris Identification 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract

More information

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA Bulletin of the Transilvania University of Braşov Series VII: Social Sciences Law Vol. 7 (56) No. 1-2014 RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA I. ARON 1 A. CTIN. MANEA

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

REFERENCES 4 CONCLUSIONS ACKNOWLEDGEMENT. Anticipated results for our investigations on acoustic and visual speech integration are:

REFERENCES 4 CONCLUSIONS ACKNOWLEDGEMENT. Anticipated results for our investigations on acoustic and visual speech integration are: Anticipated results for our investigations on acoustic and visual integration are: an improvement in recognition performance resulting from data fusion for normal input data and for a range of degraded

More information

Global and Local Quality Measures for NIR Iris Video

Global and Local Quality Measures for NIR Iris Video Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

This list supersedes the one published in the November 2002 issue of CR.

This list supersedes the one published in the November 2002 issue of CR. PERIODICALS RECEIVED This is the current list of periodicals received for review in Reviews. International standard serial numbers (ISSNs) are provided to facilitate obtaining copies of articles or subscriptions.

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Biometric Technologies for Ambient Intelligence and Smart Living Vincenzo Piuri

Biometric Technologies for Ambient Intelligence and Smart Living Vincenzo Piuri Biometric Technologies for Ambient Intelligence and Smart Living Vincenzo Piuri University of Milan, Italy 2014 IEEE Vice President-elect for Technical Activities Obuda University 2014 Summary Biometric

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners

A Novel Region Based Liveness Detection Approach for Fingerprint Scanners A Novel Region Based Liveness Detection Approach for Fingerprint Scanners Brian DeCann, Bozhao Tan, and Stephanie Schuckers Clarkson University, Potsdam, NY 13699 USA {decannbm,tanb,sschucke}@clarkson.edu

More information

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm

Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm International OPEN ACCESS Journal Of Modern Engineering Research (IJMER) Speech Enhancement Based On Spectral Subtraction For Speech Recognition System With Dpcm A.T. Rajamanickam, N.P.Subiramaniyam, A.Balamurugan*,

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper

Combined Approach for Face Detection, Eye Region Detection and Eye State Analysis- Extended Paper International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 9 (September 2014), PP.57-68 Combined Approach for Face Detection, Eye

More information

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images

Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea

More information

Card IEEE Symposium Series on Computational Intelligence

Card IEEE Symposium Series on Computational Intelligence 2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Improving the Security of Internet Banking Applications by Using Multimodal Biometrics

Improving the Security of Internet Banking Applications by Using Multimodal Biometrics Journal of Applied Computer Science & Mathematics, no. 9 (9) /205, Suceava Improving the Security of Internet Banking Applications by Using Multimodal Biometrics Cătălin LUPU, 2 Vasile-Gheorghiţă GĂITAN,

More information

Mel Spectrum Analysis of Speech Recognition using Single Microphone

Mel Spectrum Analysis of Speech Recognition using Single Microphone International Journal of Engineering Research in Electronics and Communication Mel Spectrum Analysis of Speech Recognition using Single Microphone [1] Lakshmi S.A, [2] Cholavendan M [1] PG Scholar, Sree

More information

ISSN: [Deepa* et al., 6(2): February, 2017] Impact Factor: 4.116

ISSN: [Deepa* et al., 6(2): February, 2017] Impact Factor: 4.116 IJESRT INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY IRIS RECOGNITION BASED ON IRIS CRYPTS Asst.Prof. N.Deepa*, V.Priyanka student, J.Pradeepa student. B.E CSE,G.K.M college of engineering

More information

Learning Hierarchical Visual Codebook for Iris Liveness Detection

Learning Hierarchical Visual Codebook for Iris Liveness Detection Learning Hierarchical Visual Codebook for Iris Liveness Detection Hui Zhang 1,2, Zhenan Sun 2, Tieniu Tan 2, Jianyu Wang 1,2 1.Shanghai Institute of Technical Physics, Chinese Academy of Sciences 2.National

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment.

Office hrs: QC: Tue, 1:40pm - 2:40pm; GC: Thur: 11:15am-11:45am.or by appointment. Title: Biometric Security and Privacy Handout for classes: Class schedule: Contact information and office hours: Prof. Bon Sy, Queens College (NSB A104) Phone: 718-997-3477, or 718-997-3566 to leave a

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

Computer Vision in Human-Computer Interaction

Computer Vision in Human-Computer Interaction Invited talk in 2010 Autumn Seminar and Meeting of Pattern Recognition Society of Finland, M/S Baltic Princess, 26.11.2010 Computer Vision in Human-Computer Interaction Matti Pietikäinen Machine Vision

More information

Fast Subsequent Color Iris Matching in large Database

Fast Subsequent Color Iris Matching in large Database www.ijcsi.org 72 Fast Subsequent Color Iris Matching in large Database Adnan Alam Khan 1, Safeeullah Soomro 2 and Irfan Hyder 3 1 PAF-KIET Department of Telecommunications, Employer of Institute of Business

More information

Role of multibiometric systems in analysis of biological data

Role of multibiometric systems in analysis of biological data ISSN 2319 7757 EISSN 2319 7765 Indian Journal of Engineering Review Computer Engineering REVIEW COMPUTER ENGINEERING Indian Journal of Engineering, Volume 4, Number 9, July 2013 Indian Journal of Engineering

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Modern Biometric Technologies: Technical Issues and Research Opportunities

Modern Biometric Technologies: Technical Issues and Research Opportunities Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric

More information

Iris Recognition based on Pupil using Canny edge detection and K- Means Algorithm Chinni. Jayachandra, H.Venkateswara Reddy

Iris Recognition based on Pupil using Canny edge detection and K- Means Algorithm Chinni. Jayachandra, H.Venkateswara Reddy www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 2 Issue 1 Jan 2013 Page No. 221-225 Iris Recognition based on Pupil using Canny edge detection and K- Means

More information

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation

A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition

More information

Biometrics technology: Faces

Biometrics technology: Faces References: [FC1] [FC2] Biometrics technology: Faces Toshiaki Kondo and Hong Yan, "Automatic human face detection and recognition under nonuniform illumination ", Pattern Recognition, Volume 32, Issue

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION

CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION 1.1 Introduction As with the growth of Information Technology, the need of the security has became a prime issue in the

More information

Changjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing.

Changjiang Yang. Computer Vision, Pattern Recognition, Machine Learning, Robotics, and Scientific Computing. Changjiang Yang Mailing Address: Department of Computer Science University of Maryland College Park, MD 20742 Lab Phone: (301)405-8366 Cell Phone: (410)299-9081 Fax: (301)314-9658 Email: yangcj@cs.umd.edu

More information

Biometrics Acceptance - Perceptions of Use of Biometrics

Biometrics Acceptance - Perceptions of Use of Biometrics Association for Information Systems AIS Electronic Library (AISeL) ACIS 2004 Proceedings Australasian (ACIS) December 2004 Biometrics Acceptance - Perceptions of Use of Biometrics Angela Chau University

More information

Optic Flow Based Skill Learning for A Humanoid to Trap, Approach to, and Pass a Ball

Optic Flow Based Skill Learning for A Humanoid to Trap, Approach to, and Pass a Ball Optic Flow Based Skill Learning for A Humanoid to Trap, Approach to, and Pass a Ball Masaki Ogino 1, Masaaki Kikuchi 1, Jun ichiro Ooga 1, Masahiro Aono 1 and Minoru Asada 1,2 1 Dept. of Adaptive Machine

More information

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard

Fahad Al Mannai IT 104 C01 7/8/2016. Biometrics Authentication: An Emerging IT Standard 1 Fahad Al Mannai IT 104 C01 7/8/2016 Biometrics Authentication: An Emerging IT Standard "By placing this statement on my webpage, I certify that I have read and understand the GMU Honor Code onhttp://oai.gmu.edu/the-mason-honor-code-2/

More information