Human-Computer Interaction for Biometrics
|
|
- Marcia Dorsey
- 5 years ago
- Views:
Transcription
1 Human-Computer Interaction for Biometrics Prof. Julian FIERREZ Universidad Autonoma de Madrid - SPAIN Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 1 / 50 Funding Acknowledgements Public Private Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 2 / 50 1
2 Outline 1. Biometrics in Access Control Scenarios 2. Authentication in On-Line Applications 3. Biometrics based on HCI Handwriting and Signature Graphical Passwords Swipe Biometrics Mouse Dynamics Keystroke Dynamics 5. Future Trends & Conclusions Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 3 / 50 Biometrics in Access Control Scenarios Biometric access control deployments have concentrated much efforts and resources in the last 15 years Led the market of biometric authentication technologies In those scenarios, the user is physically present (in-situ) No specific actions from the user are needed (other than placement) Once checked, access granted / denied If denied, human supervision as an alternative Physiological (morphological) modalities are in general better adapted to these type of tasks Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 4 / 50 2
3 Human Activity Patterns Human activity patterns are clearly stablished from childhood As patterns, they are stable and reproducible, though subject to variability Neuromotor coordination of gestures, movements and speech Continuous identity monitoring possible User is an active part of the play Multilevel strategy: from dynamic trajectories to expressions, context, habits, stylometry, experiences Not fixed patterns but changing and adapting ones Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 5 / 50 Human-Computer Interaction for Biometrics User is monitored / connected at least for several minutes Not only security checking but user convenience scenarios Human-device interaction (HDI) is rich in terms of human activity and behavioral patterns Keystroking Mouse dynamics On-Line Handwritting & Signature Graphical Passwords Swipe and Gesture Biometrics Speech Behavioral biometrics, but not neuromotor HDI Gait Not online HDI (just sensing) for authentication Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 6 / 50 3
4 Biometric Market by Modality Decreasing: Fingerprint, from 48% to 15% (18% excluding AFIS) Growing: Iris from 9% to 16% (19%) and Face from 12% to 15% (18%) Huge growing: Speech from 6% to 13% (15,5%) and Signature, from 2% to 10% (12%) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 7 / 50 Active Authentication by DARPA Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 8 / 50 4
5 x y z 11/04/2018 On-line Signature Verification azimuth altitude sample index Dynamic signature matching J. Fierrez and J. Ortega-Garcia, "On-line signature verification", A.K. Jain et al. (Eds), Handbook of Biometrics, Feature-based (Global Features) Distance-based classifiers Mahalanobis Euclidean [Nelson et al., 1994] Statistical/other classifiers Gaussian Mixture Models (GMM) Parzen Windows Function-based (Local Features) M. Martinez-Diaz and J. Fierrez, "Signature Databases and Evaluation", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp. Julian , Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 9 / 50 Time-Sequence matching techniques Hidden Markov Models (HMM) [Dolfing et al., 1998] Gaussian Mixture Models (GMM) [Richiardi et al., 2005] Dynamic Time Warping (DTW) [Sato and Kogure, 1982] Signature Acquisition and Pre-processing Key step to greatly reduce sensor interoperability issues due to heterogeneous devices and writing tools (stylus/finger) Preprocessing Size normalization and centering - Pressure normalization - Resampling M. Martinez-Diaz, J. Fierrez and S. Hangai, "Signature Features", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 10 / 50 5
6 Similarity Computation Hidden Markov Models (HMM) Statistical modeling of signature regions Dynamic Time Warping (DTW) Point-to-point correspondence M. Martinez-Diaz, J. Fierrez and S. Hangai, "Signature Matching", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia Julian of Fierrez Biometrics, Seminar at Springer, CIMAT, Guanajuato, pp , MEXICO April Slide 11 / 50 Use of Recurrent Neural Networks Deep Neural Network- Based System accomplishes: Linear Transformations Non-Linear Transformations (tangh, sigmoid, ReLU, etc) -> θ INPUT θ θ OUTPUT θ θ OUTPUT θ θ θ θ J. Schmidhuber, Deep Learning in Neural Networks: An Overview, Neural Networks, vol. 61, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 12 / 50 6
7 x y z 11/04/2018 Use of Recurrent Neural Networks Recurrent Neural Networks, well adapted to time sequences (speech, handwritting ) Different topologies: Long Short-Term Memory (LSTM) Gated Recurrent Unit (GRU) Also bidirectional versions: BLSTM y BGRU Siamese arquitecture Memory! Time Sequence A. Graves, A.R. Mohamed, and G. Hilton, Towards End-to-End Speech Recognition with Recurrent Neural Networks, in Proc. International Conference on Machine Learning, vol. 14, pp , R. Tolosana, R. Vera-Rodriguez, J. Fierrez and J. Ortega-Garcia, "Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics", IEEE Access, Vol. 6, pp , February Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 13 / 50 Traditional Acquisition Scenario ( ) Altitude (0-90 ) Azimuth (0-359 ) 0 M. Martinez-Diaz and J. Fierrez, "Signature Databases and Evaluation", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 14 / 50 azimuth altitude sample index 7
8 False Rejection Rate (%) 11/04/2018 Benchmarks: SVC 2004 SVC-04 random (zero-effort, casual) impostors SVC-04 skilled forgeries Our HMM implementation Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 15 / 50 BioSec Signature Evaluation Campaign, BSEC 09 DTW, HMM and Global Systems Score normalization Fusion of systems False Acceptance Rate (%) N. Houmani, et al., "BioSecure signature evaluation campaign (BSEC2009): Evaluating online signature algorithms depending onthe quality of signatures", Pattern Recognition, March Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 16 / 50 8
9 BIOTRACE100 Performance (2015) Accuracy (SLT Database): Random Forg. Skilled Forg. 4 training signatures 16 signatures 31 signatures 41 signatures 97.2 % 99.3 % 99.9 % 99.9 % 88.3 % 93.1 % 95.9 % 99.3 % State of the art performance Template and system configuration update strategies in order to minimize the aging effect R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification", IEEE Access, Vol. 3, pp , May Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 17 / 50 e-biosign Database ( ) 70 users, 2 capturing sessions 5 devices (3 Wacom, 2 Samsung) 8 genuine signatures and 6 skilled forgeries per user and device Stylus and finger as writing tools (Samsung) R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, J. Ortega-Garcia, Benchmarking Desktop and Mobile Handwriting across COTS Devices: the e-biosign Biometric Database PLOS ONE, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 18 / 50 9
10 Challenges on Handheld Devices Lack of space [Simsons et al., 2011] Stylus (or finger) Sampling quality Ergonomics [Blanco-Gonzalo et al., 2013b] Lack of pressure and orientation signals [Muramatsu and Matsumoto, 2007] Higher client-entropy [Garcia-Salicetti et al., 2008] Standing position Lack of in-air trajectories [Sesa-Nogueras et al., 2012] F. Alonso-Fernandez, J. Fierrez and J. Ortega-Garcia, "Quality Measures in Biometric Systems", IEEE Sec. & Privacy, Dec Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 19 / 50 From Signature to Touch Gestures Graphical Password-based User Authentication with Free-form Doodles M. Martinez-Diaz, J. Fierrez and J. Galbally, "Graphical Password-based User Authentication with Free-Form Doodles", IEEE Trans. on Human-Machine Systems, August M. Martinez-Diaz, J. Fierrez, and J. Galbally. The DooDB graphical password database: Data analysis and benchmark results. Julian IEEE Fierrez Access, Seminar September at CIMAT, Guanajuato, MEXICO April 2018 Slide 20 / 50 10
11 Graphical Passwords Gesture-based authentication on touch-screens Slow typing in touchscreens Biometric-rich gestures Revocability Physiological Biometrics Behavioral Biometrics Graphical Passwords M. Martinez-Diaz, J. Fierrez and J. Galbally, "The DooDB Graphical Password Database: Data Analysis and Benchmark Results", IEEE Access, Sept Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 21 / 50 Graphical Passwords: Related Works 1 2 (2,2) (3,2) (3,3) (2,3) (2,2) (2,1) Draw a Secret [Jermyn et al., 1999] US Patent B2 Pass-Go [Tao et al., 2008] Pattern Lock [Google] US Patent A1 Picture Gesture Authentication [Microsoft] US Patent A1 Multi-touch gestures [Sae-Bae et al., 2012] US Patent A1 Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 22 / 50 11
12 Graphical Examples Doodles Pseudo-signatures Genuine samples Forgeries Genuine samples Forgeries M. Martinez-Diaz, J. Fierrez and J. Galbally, "The DooDB Graphical Password Database: Data Analysis and Benchmark Results", IEEE Access, Sept Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 23 / 50 Current Work: Swipe Biometrics Continuous user authentication through touch biometrics: - Security beyond the entry-point Situation: - Freely interacting with the touchscreen while reading or viewing images Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 24 / 50 12
13 Session 2, test set High inter-user variability: distinctiveness High intra-user variability: Difficult to model the user USER A USER B Example of strokes captured for two different users Session 1, training set Abdul Serwadda, Vir V. Phoha, and Zibo Wang. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pages 1 8, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 25 / 50 Current Work: Swipe Biometrics A. Pozo, J. Fierrez, M. Martinez-Diaz, J. Galbally and A. Morales, "Exploring a Statistical Method for Touchscreen Swipe Biometrics", in Proc. Julian Fierrez Intl. Carnahan Seminar at Conference CIMAT, Guanajuato, on Security MEXICO Technology, April 2018 Slide ICCST 26 / , October
14 Distance (pixels) 11/04/2018 Current Work: Mouse Dynamics Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 27 / 50 Mouse Dynamics Mouse dynamics analyze behavior pattern of users for classification, verification and identifications. Mouse dynamics is a behavioral biometric characteristic Intra-class variability (example) Sample 1 Sample 2 Challenges High error rates High intra-class variability Advantages No intrusive Easy acquisition Continuous monitoring Distance (pixels) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 28 / 50 14
15 Mouse Dynamics: Features S. Chao, C. Zhongmin, G. Xiaohong and R. Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers and Security, vol. 45, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 29 / 50 Mouse Dynamics: Performance S. Chao, C. Zhongmin, G. Xiaohong and R. Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers and Security, vol. 45, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 30 / 50 15
16 Keystroke Dynamics Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 31 / 50 Keystroke Dynamics - History Telegraphist style during World War II Keystroke dynamics authentication emerges with the massive deployment of computers Transparent, low-cost solution Easy to implement in any keypad device R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, Authentication by keystroke timing: Some preliminary results, tech. rep., DTIC Document, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 32 / 50 16
17 Keystroke Dynamics - History Telegraphist style during World War II Keystroke dynamics authentication emerges with the massive deployment of computers Transparent, low-cost solution Easy to implement in any keypad device Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 33 / 50 Keystroke Dynamics: Scenarios Mobile Tablet Traditional Keyboard Text-dependent / passwords In a village of La Mancha, the name of which I have no desire to call to mind, there lived not long since one of those gentlemen that keep a lance in the lance-rack, an old buckler, a lean hack, and a greyhound for coursing Text-independent Buschek D, De Luca A, Alt F Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 15. Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 34 / 50 17
18 From Password-Based to Free-Text Authentication Substitute password-based authentication + keystroke dynamics Biometric system as a secondary security level to detect intruders Free text usually divided into small strings (digraphs and trigraphs) List of passwords Biometric Templates DDBB DDBB Password Match? Keystroke Biometric Accept/Denied STEP 1 STEP 2 Text level Biometric level Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 35 / 50 From Password-Based to Free-Text Authentication Substitute password-based authentication + keystroke dynamics Biometric system as a secondary security level to detect intruders Free text usually divided into small strings (digraphs and trigraphs) Biometric Templates DDBB Free Text Keystroke Biometric Accept/Denied Matching at biometric feature level Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 36 / 50 18
19 Keystroke Verification: Sequence Alignment Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected Sequence alignment through DTW M. L. Ali, J. V. Monaco, C. C. Tappert, and M. Qiu. "Keystroke biometric systems for user authentication." Journal of Signal Processing Systems 86, no. 2-3 (2017): Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 37 / 50 Keystroke Verification: Features Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected A. Morales, J. Fierrez and J. Ortega-Garcia, "Towards Predicting Good Users for Biometric Recognition based on Keystroke Dynamics", Proc. of European Conference on Computer Vision Workshops, Springer LNCS-8926, Sept A. Morales, J. Fierrez, R. Tolosana, J. Ortega-Garcia, J. Galbally, M. Gomez-Barrero, A. Anjos and S. Marcel, "Keystroke Biometrics Ongoing Competition", IEEE Access, Vol. 4, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 38 / 50 19
20 Keystroke Verification: Similarity Computation Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected Classifiers based of algorithmic fusion (GMM, SVM, normalized Manhattan distance ) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 39 / 50 Keystroke Dynamics: Performance and Benchmark Performance, strongly user-dependent and scenario-dependent. Password Authentication (CMU benchmark, 2012) : 8% EER (only genuine samples during training) Free-Text, ICB 2015 Competition: 83% Identification Rate (100 characters as query samples, 500 characters as development samples) New Benchmark: Keystroke Biometrics Ongoing Competition* J. V. Monaco, G. Perez, C. C. Tappert, P. Bours, S. Mondal, S. Rajkumar, A. Morales, J. Fierrez and J. Ortega-Garcia, "One-handed Keystroke Biometric Identification Competition", in Proc. IEEE/IAPR Int. Conf. on Biometrics, ICB, May *A. Morales, J. Fierrez, R. Tolosana, J. Ortega-Garcia, J. Galbally, M. Gomez-Barrero, A. Anjos and S. Marcel, "Keystroke Biometrics Ongoing Competition", IEEE Access, Vol. 4, pp , November Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 40 / 50 20
21 Biometrics Research: A Look into the Future Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 41 / 50 The Future of Biometrics based on HCI Challenge 1: Adapting to New Application Scenarios Knowledge Base + Experiments + Experiments - Domain adaptation - Transfer learning - Inductive transfer -... Bayesian adaptation* Discriminative adaptation** * J. Fierrez-Aguilar, D. Garcia-Romero, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Bayesian adaptation for user-dependent multimodal biometric authentication", Pattern Recognition, August **J. Fierrez-Aguilar, D. Garcia-Romero, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Adapted user-dependent multimodal biometric authentication exploiting general Julian Fierrez information", Seminar Pattern CIMAT, Recognition Guanajuato, Letters, MEXICO December April Slide 42 / 50 21
22 The Future of Biometrics based on HCI Challenge 2: Incorporating Contextual Information Signal Quality, Environmental Data, etc. Knowledge Base P. Aleksic, M. Ghodsi, et al. Bringing Contextual Information to Google Speech Recognition, Interspeech, F. Alonso-Fernandez, J. Fierrez, et al, Quality Measures in Biometric Systems, IEEE Sec. & Privacy, Dec F. Alonso-Fernandez, J. Fierrez, et al., "Quality-Based Conditional Processing in Multi-Biometrics: application to Sensor Interoperability", IEEE Trans. on Systems, Man and Cybernetics A, Vol. 40, n. 6, pp , J. Fierrez, et al., "Multiple Julian Fierrez Classifiers Seminar in at Biometrics. CIMAT, Guanajuato, Part 2: MEXICO Trends and April Challenges", 2018 Slide 43 Information / 50 Fusion, Nov Q-based enhancement [Hong et al. 98] Q-based feature weighting [Chen et al. 05] Q-based fusion [Bigun et al. 97, 03] [Fierrez et al. 05, 06] [Nandakumar et al. 06, 08] Failure to acquire event [Simon-Zorita et al. 03] [Chen et al. 05] J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez-Rodriguez and J. Bigun, "Discriminative multimodal biometric authentication based on quality measures", Pattern Recognition, May J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, November Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 44 / 50 22
23 The Future of Biometrics based on HCI Challenge 3: Adapting to the User (e.g., Aging) User-specific behaviour Knowledge base J. Fierrez, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Target Dependent Score Normalization Techniques and their Application to Signature Verification", IEEE Trans. on Systems, Man and Cybernetics-C, August J. Galbally, M. Martinez-Diaz and J. Fierrez, "Aging in Biometrics: An Experimental Analysis on On-Line Signature", PLOS ONE, July J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 45 / 50 e.g., good/bad users [Hicklin et al., The myth of goats: how many people have fingerprints that are hard to match, NISTIR 7271, 2005]. Auxiliary Information Obtained during Enrollment: Exploitation of the enrollment data (multiple samples) not only to create the templates/models but also to adjust in a userdependent way some parameters of the system during verification Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 46 / 50 23
24 Exploiting the Zoo (User-Dependent Processing) UD features [Fairhurst et al., IPRAI 94] UD modeling [Martinez et al., ICFHR 08] UD score normalization [Fierrez et al., TSMC 05] [Poh et al., MMUA 06, TASLP 08] UD fusion [Jain et al., ICIP 02] [Toh et al., TSP 04] [Snelick et al., PAMI 05] [Fierrez et al., PR 05] UD decision (e.g., UD tresholds [Jain et al., PR 02], failure to enroll events and exception handling) J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 47 / 50 GLOBAL: Set of training scores from a pool of users (genuine and impostor) LOCAL: Set of training scores from the user at hand (genuine and impostor) Bayesian and SVM user-dependent fusion algorithms J. Fierrez, A. Morales, R. Vera- Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 48 / 50 24
25 11/04/2018 The Future of Biometrics based on HCI Challenge 4: Exploiting Big Data Ruben Tolosana, Ruben Vera, Julian Fierrez, Javier Ortega, Exploring Recurrent Neural Network for Handwriting Signature Biometrics IEEE Access, Anonymized info Big Data Signer 1 Deep Learning Signer N Knowledge Base Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 49 / 50 Conclusions Revocability Easy of use, user acceptance Less sensor-interoperability issues Easy to integrate at low-cost Continuous ID User intra-variability Multi-sample training Model updating Multilevel strategies Data scarcity Matureness of technologies (signature, keystroke) Major role in on-line and mobile remote applications User convenience to drive application development Room for substantial industry-applicable research Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 50 / 50 25
IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ
IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk Julian FIERREZ [https://atvs.ii.uam.es/fierrez] School of Engineering UNIVERSIDAD AUTONOMA DE MADRID, SPAIN Denver CO, USA, Oct. 3, 2017
More informationComplexity-based Biometric Signature Verification
Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More informationClassification of Handwritten Signatures Based on Name Legibility
Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de
More informationIncorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits
Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation
More informationOnline handwritten signature verification system: A Review
Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationIdentity and Message recognition by biometric signals
Identity and Message recognition by biometric signals J. Bigun, F. Alonso-Fernandez, S. M. Karlsson, A. Mikaelyan Abstract The project addresses visual information representation, and extraction. The problem
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationDirect Attacks Using Fake Images in Iris Verification
Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.
More informationEvaluation of Online Signature Verification Features
Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationEvaluating the Biometric Sample Quality of Handwritten Signatures
Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer
More informationInternational Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)
Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.
More informationStatic Signature Verification and Recognition using Neural Network Approach-A Survey
Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network
More informationA novel method to generate Brute-Force Signature Forgeries
A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationResearch Seminar. Stefano CARRINO fr.ch
Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks
More informationOnline Signature Verification on Mobile Devices
IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationUser Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationWriter identification clustering letters with unknown authors
Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationProceedings of the 2014 Federated Conference on Computer Science and Information Systems pp
Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More informationSignature authentication based on human intervention: performance and complementarity with automatic systems
IET Biometrics Special Issue: Selected Papers from the International Workshop on Biometrics and Forensics (IWBF2016) Signature authentication based on human intervention: performance and complementarity
More informationSpecific Sensors for Face Recognition
Specific Sensors for Face Recognition Walid Hizem, Emine Krichen, Yang Ni, Bernadette Dorizzi, and Sonia Garcia-Salicetti Département Electronique et Physique, Institut National des Télécommunications,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationPerformance Analysis of Multimodal Biometric System Authentication
290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationUser Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno
CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...
More informationList of Publications for Thesis
List of Publications for Thesis Felix Juefei-Xu CyLab Biometrics Center, Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 15213, USA felixu@cmu.edu 1. Journal Publications
More informationBiometric: EEG brainwaves
Biometric: EEG brainwaves Jeovane Honório Alves 1 1 Department of Computer Science Federal University of Parana Curitiba December 5, 2016 Jeovane Honório Alves (UFPR) Biometric: EEG brainwaves Curitiba
More informationOnline Signature Verification: A Review
J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationCity Research Online. Permanent City Research Online URL:
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable
More informationEFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION
EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationWho Dotted That i? : Context Free User Differentiation through Pressure and Tilt Pen Data
Who Dotted That i? : Context Free User Differentiation through Pressure and Tilt Pen Data Brian David Eoff Sketch Recognition Lab Texas A&M University Tracy Hammond Sketch Recognition Lab Texas A&M University
More informationIris Recognition-based Security System with Canny Filter
Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationA Survey of Multibiometric Systems
A Survey of Multibiometric Systems Harbi AlMahafzah P.E.T. Research Center, University Of Mysore, Mandya, India hmahafzah@hotmail.com Ma en Zaid AlRwashdeh Department of Study in Computer science, University
More informationCOMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL
COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,
More informationApply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition
www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationAnalyzing features learned for Offline Signature Verification using Deep CNNs
Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationMultibiometric Systems: Overview, Case Studies and Open Issues
Chapter 11 Multibiometric Systems: Overview, Case Studies and Open Issues Arun Ross and Norman Poh Abstract Information fusion refers to the reconciliation of evidence presented by multiple sources of
More informationAuthentication Using Pulse-Response Biometrics
Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit
More informationOnline Signature Verification by Using FPGA
Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationAn Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander
More informationSession 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)
Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation
More informationOffline Signature Verification for Cheque Authentication Using Different Technique
Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi
More informationIRIS RECOGNITION USING GABOR
IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition
More informationPixel Based Off-line Signature Verification System
Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationA Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature
A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University
More informationMulti-modal Face Recognition
Multi-modal Face Recognition Hu Han hanhu@ict.ac.cn http://vipl.ict.ac.cn/members/hhan 2016/04/06 Outline Background Related work Multi-modal & cross-modal FR Trend on multi-modal (face) recognition Conclusion
More informationEmpirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches
Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at Workshop on Insight on Eye Biometrics, IEB, in conjunction with the th International Conference on Signal-Image
More informationDISCUSSION. 12th IAPR International Workshop on Graphics Recognition Kyoto, Japan - November Josep Lladós
GREC2017 FINAL PANEL DISCUSSION 12th IAPR International Workshop on Graphics Recognition Kyoto, Japan - November 9-10 2017 Josep Lladós Statistics in GREC series Statistics in GREC series A traditional
More informationTools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)
Tools for Iris Recognition Engines Martin George CEO Smart Sensors Limited (UK) About Smart Sensors Limited Owns and develops Intellectual Property for image recognition, identification and analytics applications
More informationA Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches
International Journal for Information Security Research (IJISR), Volume 6, Issue 3, September 2016691691 A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches Neamah Al-Naffakh
More informationAutomated Signature Detection from Hand Movement ¹
Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationDesign a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison
e-issn 2455 1392 Volume 2 Issue 10, October 2016 pp. 34 41 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Design a Model and Algorithm for multi Way Gesture Recognition using Motion and
More informationImage Forgery Detection Using Svm Classifier
Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama
More informationCHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION
CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION 1.1 Introduction As with the growth of Information Technology, the need of the security has became a prime issue in the
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationIDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE
International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro
More informationPreprocessing and postprocessing for skeleton-based fingerprint minutiae extraction
Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More informationAutomatic Licenses Plate Recognition System
Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.
More informationA Hand Gesture-Based Method for Biometric Authentication
A Hand Gesture-Based Method for Biometric Authentication Satoru Imura and Hiroshi Hosobe Faculty of Computer and Information Sciences, Hosei University, Tokyo, Japan hosobe@acm.org Abstract. With the spread
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More information