Human-Computer Interaction for Biometrics

Size: px
Start display at page:

Download "Human-Computer Interaction for Biometrics"

Transcription

1 Human-Computer Interaction for Biometrics Prof. Julian FIERREZ Universidad Autonoma de Madrid - SPAIN Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 1 / 50 Funding Acknowledgements Public Private Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 2 / 50 1

2 Outline 1. Biometrics in Access Control Scenarios 2. Authentication in On-Line Applications 3. Biometrics based on HCI Handwriting and Signature Graphical Passwords Swipe Biometrics Mouse Dynamics Keystroke Dynamics 5. Future Trends & Conclusions Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 3 / 50 Biometrics in Access Control Scenarios Biometric access control deployments have concentrated much efforts and resources in the last 15 years Led the market of biometric authentication technologies In those scenarios, the user is physically present (in-situ) No specific actions from the user are needed (other than placement) Once checked, access granted / denied If denied, human supervision as an alternative Physiological (morphological) modalities are in general better adapted to these type of tasks Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 4 / 50 2

3 Human Activity Patterns Human activity patterns are clearly stablished from childhood As patterns, they are stable and reproducible, though subject to variability Neuromotor coordination of gestures, movements and speech Continuous identity monitoring possible User is an active part of the play Multilevel strategy: from dynamic trajectories to expressions, context, habits, stylometry, experiences Not fixed patterns but changing and adapting ones Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 5 / 50 Human-Computer Interaction for Biometrics User is monitored / connected at least for several minutes Not only security checking but user convenience scenarios Human-device interaction (HDI) is rich in terms of human activity and behavioral patterns Keystroking Mouse dynamics On-Line Handwritting & Signature Graphical Passwords Swipe and Gesture Biometrics Speech Behavioral biometrics, but not neuromotor HDI Gait Not online HDI (just sensing) for authentication Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 6 / 50 3

4 Biometric Market by Modality Decreasing: Fingerprint, from 48% to 15% (18% excluding AFIS) Growing: Iris from 9% to 16% (19%) and Face from 12% to 15% (18%) Huge growing: Speech from 6% to 13% (15,5%) and Signature, from 2% to 10% (12%) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 7 / 50 Active Authentication by DARPA Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 8 / 50 4

5 x y z 11/04/2018 On-line Signature Verification azimuth altitude sample index Dynamic signature matching J. Fierrez and J. Ortega-Garcia, "On-line signature verification", A.K. Jain et al. (Eds), Handbook of Biometrics, Feature-based (Global Features) Distance-based classifiers Mahalanobis Euclidean [Nelson et al., 1994] Statistical/other classifiers Gaussian Mixture Models (GMM) Parzen Windows Function-based (Local Features) M. Martinez-Diaz and J. Fierrez, "Signature Databases and Evaluation", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp. Julian , Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 9 / 50 Time-Sequence matching techniques Hidden Markov Models (HMM) [Dolfing et al., 1998] Gaussian Mixture Models (GMM) [Richiardi et al., 2005] Dynamic Time Warping (DTW) [Sato and Kogure, 1982] Signature Acquisition and Pre-processing Key step to greatly reduce sensor interoperability issues due to heterogeneous devices and writing tools (stylus/finger) Preprocessing Size normalization and centering - Pressure normalization - Resampling M. Martinez-Diaz, J. Fierrez and S. Hangai, "Signature Features", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 10 / 50 5

6 Similarity Computation Hidden Markov Models (HMM) Statistical modeling of signature regions Dynamic Time Warping (DTW) Point-to-point correspondence M. Martinez-Diaz, J. Fierrez and S. Hangai, "Signature Matching", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia Julian of Fierrez Biometrics, Seminar at Springer, CIMAT, Guanajuato, pp , MEXICO April Slide 11 / 50 Use of Recurrent Neural Networks Deep Neural Network- Based System accomplishes: Linear Transformations Non-Linear Transformations (tangh, sigmoid, ReLU, etc) -> θ INPUT θ θ OUTPUT θ θ OUTPUT θ θ θ θ J. Schmidhuber, Deep Learning in Neural Networks: An Overview, Neural Networks, vol. 61, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 12 / 50 6

7 x y z 11/04/2018 Use of Recurrent Neural Networks Recurrent Neural Networks, well adapted to time sequences (speech, handwritting ) Different topologies: Long Short-Term Memory (LSTM) Gated Recurrent Unit (GRU) Also bidirectional versions: BLSTM y BGRU Siamese arquitecture Memory! Time Sequence A. Graves, A.R. Mohamed, and G. Hilton, Towards End-to-End Speech Recognition with Recurrent Neural Networks, in Proc. International Conference on Machine Learning, vol. 14, pp , R. Tolosana, R. Vera-Rodriguez, J. Fierrez and J. Ortega-Garcia, "Exploring Recurrent Neural Networks for On-Line Handwritten Signature Biometrics", IEEE Access, Vol. 6, pp , February Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 13 / 50 Traditional Acquisition Scenario ( ) Altitude (0-90 ) Azimuth (0-359 ) 0 M. Martinez-Diaz and J. Fierrez, "Signature Databases and Evaluation", Stan Z. Li and Anil K. Jain (Eds.), Encyclopedia of Biometrics, Springer, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 14 / 50 azimuth altitude sample index 7

8 False Rejection Rate (%) 11/04/2018 Benchmarks: SVC 2004 SVC-04 random (zero-effort, casual) impostors SVC-04 skilled forgeries Our HMM implementation Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 15 / 50 BioSec Signature Evaluation Campaign, BSEC 09 DTW, HMM and Global Systems Score normalization Fusion of systems False Acceptance Rate (%) N. Houmani, et al., "BioSecure signature evaluation campaign (BSEC2009): Evaluating online signature algorithms depending onthe quality of signatures", Pattern Recognition, March Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 16 / 50 8

9 BIOTRACE100 Performance (2015) Accuracy (SLT Database): Random Forg. Skilled Forg. 4 training signatures 16 signatures 31 signatures 41 signatures 97.2 % 99.3 % 99.9 % 99.9 % 88.3 % 93.1 % 95.9 % 99.3 % State of the art performance Template and system configuration update strategies in order to minimize the aging effect R. Tolosana, R. Vera-Rodriguez, J. Ortega-Garcia and J. Fierrez, "Preprocessing and Feature Selection for Improved Sensor Interoperability in Online Biometric Signature Verification", IEEE Access, Vol. 3, pp , May Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 17 / 50 e-biosign Database ( ) 70 users, 2 capturing sessions 5 devices (3 Wacom, 2 Samsung) 8 genuine signatures and 6 skilled forgeries per user and device Stylus and finger as writing tools (Samsung) R. Tolosana, R. Vera-Rodriguez, J. Fierrez, A. Morales, J. Ortega-Garcia, Benchmarking Desktop and Mobile Handwriting across COTS Devices: the e-biosign Biometric Database PLOS ONE, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 18 / 50 9

10 Challenges on Handheld Devices Lack of space [Simsons et al., 2011] Stylus (or finger) Sampling quality Ergonomics [Blanco-Gonzalo et al., 2013b] Lack of pressure and orientation signals [Muramatsu and Matsumoto, 2007] Higher client-entropy [Garcia-Salicetti et al., 2008] Standing position Lack of in-air trajectories [Sesa-Nogueras et al., 2012] F. Alonso-Fernandez, J. Fierrez and J. Ortega-Garcia, "Quality Measures in Biometric Systems", IEEE Sec. & Privacy, Dec Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 19 / 50 From Signature to Touch Gestures Graphical Password-based User Authentication with Free-form Doodles M. Martinez-Diaz, J. Fierrez and J. Galbally, "Graphical Password-based User Authentication with Free-Form Doodles", IEEE Trans. on Human-Machine Systems, August M. Martinez-Diaz, J. Fierrez, and J. Galbally. The DooDB graphical password database: Data analysis and benchmark results. Julian IEEE Fierrez Access, Seminar September at CIMAT, Guanajuato, MEXICO April 2018 Slide 20 / 50 10

11 Graphical Passwords Gesture-based authentication on touch-screens Slow typing in touchscreens Biometric-rich gestures Revocability Physiological Biometrics Behavioral Biometrics Graphical Passwords M. Martinez-Diaz, J. Fierrez and J. Galbally, "The DooDB Graphical Password Database: Data Analysis and Benchmark Results", IEEE Access, Sept Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 21 / 50 Graphical Passwords: Related Works 1 2 (2,2) (3,2) (3,3) (2,3) (2,2) (2,1) Draw a Secret [Jermyn et al., 1999] US Patent B2 Pass-Go [Tao et al., 2008] Pattern Lock [Google] US Patent A1 Picture Gesture Authentication [Microsoft] US Patent A1 Multi-touch gestures [Sae-Bae et al., 2012] US Patent A1 Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 22 / 50 11

12 Graphical Examples Doodles Pseudo-signatures Genuine samples Forgeries Genuine samples Forgeries M. Martinez-Diaz, J. Fierrez and J. Galbally, "The DooDB Graphical Password Database: Data Analysis and Benchmark Results", IEEE Access, Sept Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 23 / 50 Current Work: Swipe Biometrics Continuous user authentication through touch biometrics: - Security beyond the entry-point Situation: - Freely interacting with the touchscreen while reading or viewing images Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 24 / 50 12

13 Session 2, test set High inter-user variability: distinctiveness High intra-user variability: Difficult to model the user USER A USER B Example of strokes captured for two different users Session 1, training set Abdul Serwadda, Vir V. Phoha, and Zibo Wang. Which verifiers work?: A benchmark evaluation of touch-based authentication algorithms. In 2013 IEEE Sixth International Conference on Biometrics: Theory, Applications and Systems (BTAS), pages 1 8, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 25 / 50 Current Work: Swipe Biometrics A. Pozo, J. Fierrez, M. Martinez-Diaz, J. Galbally and A. Morales, "Exploring a Statistical Method for Touchscreen Swipe Biometrics", in Proc. Julian Fierrez Intl. Carnahan Seminar at Conference CIMAT, Guanajuato, on Security MEXICO Technology, April 2018 Slide ICCST 26 / , October

14 Distance (pixels) 11/04/2018 Current Work: Mouse Dynamics Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 27 / 50 Mouse Dynamics Mouse dynamics analyze behavior pattern of users for classification, verification and identifications. Mouse dynamics is a behavioral biometric characteristic Intra-class variability (example) Sample 1 Sample 2 Challenges High error rates High intra-class variability Advantages No intrusive Easy acquisition Continuous monitoring Distance (pixels) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 28 / 50 14

15 Mouse Dynamics: Features S. Chao, C. Zhongmin, G. Xiaohong and R. Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers and Security, vol. 45, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 29 / 50 Mouse Dynamics: Performance S. Chao, C. Zhongmin, G. Xiaohong and R. Maxion, Performance evaluation of anomaly-detection algorithms for mouse dynamics, Computers and Security, vol. 45, pp , Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 30 / 50 15

16 Keystroke Dynamics Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 31 / 50 Keystroke Dynamics - History Telegraphist style during World War II Keystroke dynamics authentication emerges with the massive deployment of computers Transparent, low-cost solution Easy to implement in any keypad device R. S. Gaines, W. Lisowski, S. J. Press, and N. Shapiro, Authentication by keystroke timing: Some preliminary results, tech. rep., DTIC Document, Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 32 / 50 16

17 Keystroke Dynamics - History Telegraphist style during World War II Keystroke dynamics authentication emerges with the massive deployment of computers Transparent, low-cost solution Easy to implement in any keypad device Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 33 / 50 Keystroke Dynamics: Scenarios Mobile Tablet Traditional Keyboard Text-dependent / passwords In a village of La Mancha, the name of which I have no desire to call to mind, there lived not long since one of those gentlemen that keep a lance in the lance-rack, an old buckler, a lean hack, and a greyhound for coursing Text-independent Buschek D, De Luca A, Alt F Improving accuracy, applicability and usability of keystroke biometrics on mobile touchscreen devices. Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems, CHI 15. Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 34 / 50 17

18 From Password-Based to Free-Text Authentication Substitute password-based authentication + keystroke dynamics Biometric system as a secondary security level to detect intruders Free text usually divided into small strings (digraphs and trigraphs) List of passwords Biometric Templates DDBB DDBB Password Match? Keystroke Biometric Accept/Denied STEP 1 STEP 2 Text level Biometric level Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 35 / 50 From Password-Based to Free-Text Authentication Substitute password-based authentication + keystroke dynamics Biometric system as a secondary security level to detect intruders Free text usually divided into small strings (digraphs and trigraphs) Biometric Templates DDBB Free Text Keystroke Biometric Accept/Denied Matching at biometric feature level Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 36 / 50 18

19 Keystroke Verification: Sequence Alignment Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected Sequence alignment through DTW M. L. Ali, J. V. Monaco, C. C. Tappert, and M. Qiu. "Keystroke biometric systems for user authentication." Journal of Signal Processing Systems 86, no. 2-3 (2017): Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 37 / 50 Keystroke Verification: Features Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected A. Morales, J. Fierrez and J. Ortega-Garcia, "Towards Predicting Good Users for Biometric Recognition based on Keystroke Dynamics", Proc. of European Conference on Computer Vision Workshops, Springer LNCS-8926, Sept A. Morales, J. Fierrez, R. Tolosana, J. Ortega-Garcia, J. Galbally, M. Gomez-Barrero, A. Anjos and S. Marcel, "Keystroke Biometrics Ongoing Competition", IEEE Access, Vol. 4, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 38 / 50 19

20 Keystroke Verification: Similarity Computation Identity claim Input sample Keystroke Verification Enrolled models Preprocessing Feature Extraction Similarity Computation Score normalization Decision Threshold Accepted or rejected Classifiers based of algorithmic fusion (GMM, SVM, normalized Manhattan distance ) Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 39 / 50 Keystroke Dynamics: Performance and Benchmark Performance, strongly user-dependent and scenario-dependent. Password Authentication (CMU benchmark, 2012) : 8% EER (only genuine samples during training) Free-Text, ICB 2015 Competition: 83% Identification Rate (100 characters as query samples, 500 characters as development samples) New Benchmark: Keystroke Biometrics Ongoing Competition* J. V. Monaco, G. Perez, C. C. Tappert, P. Bours, S. Mondal, S. Rajkumar, A. Morales, J. Fierrez and J. Ortega-Garcia, "One-handed Keystroke Biometric Identification Competition", in Proc. IEEE/IAPR Int. Conf. on Biometrics, ICB, May *A. Morales, J. Fierrez, R. Tolosana, J. Ortega-Garcia, J. Galbally, M. Gomez-Barrero, A. Anjos and S. Marcel, "Keystroke Biometrics Ongoing Competition", IEEE Access, Vol. 4, pp , November Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 40 / 50 20

21 Biometrics Research: A Look into the Future Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 41 / 50 The Future of Biometrics based on HCI Challenge 1: Adapting to New Application Scenarios Knowledge Base + Experiments + Experiments - Domain adaptation - Transfer learning - Inductive transfer -... Bayesian adaptation* Discriminative adaptation** * J. Fierrez-Aguilar, D. Garcia-Romero, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Bayesian adaptation for user-dependent multimodal biometric authentication", Pattern Recognition, August **J. Fierrez-Aguilar, D. Garcia-Romero, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Adapted user-dependent multimodal biometric authentication exploiting general Julian Fierrez information", Seminar Pattern CIMAT, Recognition Guanajuato, Letters, MEXICO December April Slide 42 / 50 21

22 The Future of Biometrics based on HCI Challenge 2: Incorporating Contextual Information Signal Quality, Environmental Data, etc. Knowledge Base P. Aleksic, M. Ghodsi, et al. Bringing Contextual Information to Google Speech Recognition, Interspeech, F. Alonso-Fernandez, J. Fierrez, et al, Quality Measures in Biometric Systems, IEEE Sec. & Privacy, Dec F. Alonso-Fernandez, J. Fierrez, et al., "Quality-Based Conditional Processing in Multi-Biometrics: application to Sensor Interoperability", IEEE Trans. on Systems, Man and Cybernetics A, Vol. 40, n. 6, pp , J. Fierrez, et al., "Multiple Julian Fierrez Classifiers Seminar in at Biometrics. CIMAT, Guanajuato, Part 2: MEXICO Trends and April Challenges", 2018 Slide 43 Information / 50 Fusion, Nov Q-based enhancement [Hong et al. 98] Q-based feature weighting [Chen et al. 05] Q-based fusion [Bigun et al. 97, 03] [Fierrez et al. 05, 06] [Nandakumar et al. 06, 08] Failure to acquire event [Simon-Zorita et al. 03] [Chen et al. 05] J. Fierrez-Aguilar, J. Ortega-Garcia, J. Gonzalez-Rodriguez and J. Bigun, "Discriminative multimodal biometric authentication based on quality measures", Pattern Recognition, May J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, November Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 44 / 50 22

23 The Future of Biometrics based on HCI Challenge 3: Adapting to the User (e.g., Aging) User-specific behaviour Knowledge base J. Fierrez, J. Ortega-Garcia and J. Gonzalez-Rodriguez, "Target Dependent Score Normalization Techniques and their Application to Signature Verification", IEEE Trans. on Systems, Man and Cybernetics-C, August J. Galbally, M. Martinez-Diaz and J. Fierrez, "Aging in Biometrics: An Experimental Analysis on On-Line Signature", PLOS ONE, July J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 45 / 50 e.g., good/bad users [Hicklin et al., The myth of goats: how many people have fingerprints that are hard to match, NISTIR 7271, 2005]. Auxiliary Information Obtained during Enrollment: Exploitation of the enrollment data (multiple samples) not only to create the templates/models but also to adjust in a userdependent way some parameters of the system during verification Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 46 / 50 23

24 Exploiting the Zoo (User-Dependent Processing) UD features [Fairhurst et al., IPRAI 94] UD modeling [Martinez et al., ICFHR 08] UD score normalization [Fierrez et al., TSMC 05] [Poh et al., MMUA 06, TASLP 08] UD fusion [Jain et al., ICIP 02] [Toh et al., TSP 04] [Snelick et al., PAMI 05] [Fierrez et al., PR 05] UD decision (e.g., UD tresholds [Jain et al., PR 02], failure to enroll events and exception handling) J. Fierrez, A. Morales, R. Vera-Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 47 / 50 GLOBAL: Set of training scores from a pool of users (genuine and impostor) LOCAL: Set of training scores from the user at hand (genuine and impostor) Bayesian and SVM user-dependent fusion algorithms J. Fierrez, A. Morales, R. Vera- Rodriguez and D. Camacho, "Multiple Classifiers in Biometrics. Part 2: Trends and Challenges", Information Fusion, Nov Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 48 / 50 24

25 11/04/2018 The Future of Biometrics based on HCI Challenge 4: Exploiting Big Data Ruben Tolosana, Ruben Vera, Julian Fierrez, Javier Ortega, Exploring Recurrent Neural Network for Handwriting Signature Biometrics IEEE Access, Anonymized info Big Data Signer 1 Deep Learning Signer N Knowledge Base Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 49 / 50 Conclusions Revocability Easy of use, user acceptance Less sensor-interoperability issues Easy to integrate at low-cost Continuous ID User intra-variability Multi-sample training Model updating Multilevel strategies Data scarcity Matureness of technologies (signature, keystroke) Major role in on-line and mobile remote applications User convenience to drive application development Room for substantial industry-applicable research Julian Fierrez Seminar at CIMAT, Guanajuato, MEXICO April 2018 Slide 50 / 50 25

IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ

IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk. Julian FIERREZ IAPR Young Biometrics Investigator Award IJCB 2017 Keynote Talk Julian FIERREZ [https://atvs.ii.uam.es/fierrez] School of Engineering UNIVERSIDAD AUTONOMA DE MADRID, SPAIN Denver CO, USA, Oct. 3, 2017

More information

Complexity-based Biometric Signature Verification

Complexity-based Biometric Signature Verification Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela

More information

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

Classification of Handwritten Signatures Based on Name Legibility

Classification of Handwritten Signatures Based on Name Legibility Classification of Handwritten Signatures Based on Name Legibility Javier Galbally, Julian Fierrez and Javier Ortega-Garcia Biometrics Research Lab./ATVS, EPS, Universidad Autonoma de Madrid, Campus de

More information

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits

Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Incorporating Touch Biometrics to Mobile One-Time Passwords: Exploration of Digits Ruben Tolosana, Ruben Vera-Rodriguez, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analtics (BiDA)

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Conf. on Biometrics: Theory, Applications and Systems, BTAS, Washington DC, USA, 27-29 Sept., 27. Citation

More information

Online handwritten signature verification system: A Review

Online handwritten signature verification system: A Review Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Identity and Message recognition by biometric signals

Identity and Message recognition by biometric signals Identity and Message recognition by biometric signals J. Bigun, F. Alonso-Fernandez, S. M. Karlsson, A. Mikaelyan Abstract The project addresses visual information representation, and extraction. The problem

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Direct Attacks Using Fake Images in Iris Verification

Direct Attacks Using Fake Images in Iris Verification Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Evaluating the Biometric Sample Quality of Handwritten Signatures

Evaluating the Biometric Sample Quality of Handwritten Signatures Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

A novel method to generate Brute-Force Signature Forgeries

A novel method to generate Brute-Force Signature Forgeries A novel method to generate Brute-Force Signature Forgeries DIUF-RR 274 06-09 Alain Wahl 1 Jean Hennebert 2 Andreas Humm 3 Rolf Ingold 4 June 12, 2006 Department of Informatics Research Report Département

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

Research Seminar. Stefano CARRINO fr.ch

Research Seminar. Stefano CARRINO  fr.ch Research Seminar Stefano CARRINO stefano.carrino@hefr.ch http://aramis.project.eia- fr.ch 26.03.2010 - based interaction Characterization Recognition Typical approach Design challenges, advantages, drawbacks

More information

Online Signature Verification on Mobile Devices

Online Signature Verification on Mobile Devices IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 10 April 2016 ISSN (online): 2349-784X Online Signature Verification on Mobile Devices Miss. Hude. Kalyani. A. Miss. Khande

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Writer identification clustering letters with unknown authors

Writer identification clustering letters with unknown authors Writer identification clustering letters with unknown authors Joanna Putz-Leszczynska To cite this version: Joanna Putz-Leszczynska. Writer identification clustering letters with unknown authors. 17th

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp

Proceedings of the 2014 Federated Conference on Computer Science and Information Systems pp Proceedings of the 204 Federated Conference on Computer Science and Information Systems pp. 70 708 DOI: 0.5439/204F59 ACSIS, Vol. 2 Handwritten Signature Verification with 2D Color Barcodes Marco Querini,

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

Signature authentication based on human intervention: performance and complementarity with automatic systems

Signature authentication based on human intervention: performance and complementarity with automatic systems IET Biometrics Special Issue: Selected Papers from the International Workshop on Biometrics and Forensics (IWBF2016) Signature authentication based on human intervention: performance and complementarity

More information

Specific Sensors for Face Recognition

Specific Sensors for Face Recognition Specific Sensors for Face Recognition Walid Hizem, Emine Krichen, Yang Ni, Bernadette Dorizzi, and Sonia Garcia-Salicetti Département Electronique et Physique, Institut National des Télécommunications,

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

Performance Analysis of Multimodal Biometric System Authentication

Performance Analysis of Multimodal Biometric System Authentication 290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute

More information

The Use of Static Biometric Signature Data from Public Service Forms

The Use of Static Biometric Signature Data from Public Service Forms The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

List of Publications for Thesis

List of Publications for Thesis List of Publications for Thesis Felix Juefei-Xu CyLab Biometrics Center, Electrical and Computer Engineering Carnegie Mellon University, Pittsburgh, PA 15213, USA felixu@cmu.edu 1. Journal Publications

More information

Biometric: EEG brainwaves

Biometric: EEG brainwaves Biometric: EEG brainwaves Jeovane Honório Alves 1 1 Department of Computer Science Federal University of Parana Curitiba December 5, 2016 Jeovane Honório Alves (UFPR) Biometric: EEG brainwaves Curitiba

More information

Online Signature Verification: A Review

Online Signature Verification: A Review J. Appl. Environ. Biol. Sci., 4(9S)303-308, 2014 2014, TextRoad Publication ISSN: 2090-4274 Journal of Applied Environmental and Biological Sciences www.textroad.com Online Signature Verification: A Review

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition

Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam

More information

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Who Dotted That i? : Context Free User Differentiation through Pressure and Tilt Pen Data

Who Dotted That i? : Context Free User Differentiation through Pressure and Tilt Pen Data Who Dotted That i? : Context Free User Differentiation through Pressure and Tilt Pen Data Brian David Eoff Sketch Recognition Lab Texas A&M University Tracy Hammond Sketch Recognition Lab Texas A&M University

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

Segmentation of Fingerprint Images

Segmentation of Fingerprint Images Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands

More information

A Survey of Multibiometric Systems

A Survey of Multibiometric Systems A Survey of Multibiometric Systems Harbi AlMahafzah P.E.T. Research Center, University Of Mysore, Mandya, India hmahafzah@hotmail.com Ma en Zaid AlRwashdeh Department of Study in Computer science, University

More information

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,

More information

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition

Apply Multi-Layer Perceptrons Neural Network for Off-line signature verification and recognition www.ijcsi.org 261 Apply Multi-Layer Perceptrons eural etwork for Off-line signature verification and recognition Suhail Odeh and Manal Khalil Computer And Information Systems Department, Bethlehem University

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Shannon Information theory, coding and biometrics. Han Vinck June 2013 Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

Multibiometric Systems: Overview, Case Studies and Open Issues

Multibiometric Systems: Overview, Case Studies and Open Issues Chapter 11 Multibiometric Systems: Overview, Case Studies and Open Issues Arun Ross and Norman Poh Abstract Information fusion refers to the reconciliation of evidence presented by multiple sources of

More information

Authentication Using Pulse-Response Biometrics

Authentication Using Pulse-Response Biometrics Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit

More information

Online Signature Verification by Using FPGA

Online Signature Verification by Using FPGA Online Signature Verification by Using FPGA D.Sandeep Assistant Professor, Department of ECE, Vignan Institute of Technology & Science, Telangana, India. ABSTRACT: The main aim of this project is used

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2

An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2 IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander

More information

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster)

Session 2: 10 Year Vision session (11:00-12:20) - Tuesday. Session 3: Poster Highlights A (14:00-15:00) - Tuesday 20 posters (3minutes per poster) Lessons from Collecting a Million Biometric Samples 109 Expression Robust 3D Face Recognition by Matching Multi-component Local Shape Descriptors on the Nasal and Adjoining Cheek Regions 177 Shared Representation

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

Pixel Based Off-line Signature Verification System

Pixel Based Off-line Signature Verification System Research Paper American Journal of Engineering Research (AJER) e-issn : 2320-0847 p-issn : 2320-0936 Volume-04, Issue-01, pp-187-192 www.ajer.org Open Access Pixel Based Off-line Signature Verification

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature

A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature A Cryptosystem With Private Key Generation From Dynamic Properties of Human Hand Signature HAO FENG School of Electrical & Electronic Engineering A thesis submitted to the Nanyang Technological University

More information

Multi-modal Face Recognition

Multi-modal Face Recognition Multi-modal Face Recognition Hu Han hanhu@ict.ac.cn http://vipl.ict.ac.cn/members/hhan 2016/04/06 Outline Background Related work Multi-modal & cross-modal FR Trend on multi-modal (face) recognition Conclusion

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at Workshop on Insight on Eye Biometrics, IEB, in conjunction with the th International Conference on Signal-Image

More information

DISCUSSION. 12th IAPR International Workshop on Graphics Recognition Kyoto, Japan - November Josep Lladós

DISCUSSION. 12th IAPR International Workshop on Graphics Recognition Kyoto, Japan - November Josep Lladós GREC2017 FINAL PANEL DISCUSSION 12th IAPR International Workshop on Graphics Recognition Kyoto, Japan - November 9-10 2017 Josep Lladós Statistics in GREC series Statistics in GREC series A traditional

More information

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK) Tools for Iris Recognition Engines Martin George CEO Smart Sensors Limited (UK) About Smart Sensors Limited Owns and develops Intellectual Property for image recognition, identification and analytics applications

More information

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches

A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches International Journal for Information Security Research (IJISR), Volume 6, Issue 3, September 2016691691 A Comprehensive Evaluation of Feature Selection for Gait Recognition Using Smartwatches Neamah Al-Naffakh

More information

Automated Signature Detection from Hand Movement ¹

Automated Signature Detection from Hand Movement ¹ Automated Signature Detection from Hand Movement ¹ Mladen Savov, Georgi Gluhchev Abstract: The problem of analyzing hand movements of an individual placing a signature has been studied in order to identify

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

Design a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison

Design a Model and Algorithm for multi Way Gesture Recognition using Motion and Image Comparison e-issn 2455 1392 Volume 2 Issue 10, October 2016 pp. 34 41 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Design a Model and Algorithm for multi Way Gesture Recognition using Motion and

More information

Image Forgery Detection Using Svm Classifier

Image Forgery Detection Using Svm Classifier Image Forgery Detection Using Svm Classifier Anita Sahani 1, K.Srilatha 2 M.E. Student [Embedded System], Dept. Of E.C.E., Sathyabama University, Chennai, India 1 Assistant Professor, Dept. Of E.C.E, Sathyabama

More information

CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION

CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION CHAPTER 1 INTRODUCTION TO BIOMETRIC TECHNOLOGY FOR IDENTIFICATION AND VERIFICATION 1.1 Introduction As with the growth of Information Technology, the need of the security has became a prime issue in the

More information

Card IEEE Symposium Series on Computational Intelligence

Card IEEE Symposium Series on Computational Intelligence 2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion

More information

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE

IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE International Journal of Technology (2011) 1: 56 64 ISSN 2086 9614 IJTech 2011 IDENTIFICATION OF SIGNATURES TRANSMITTED OVER RAYLEIGH FADING CHANNEL BY USING HMM AND RLE Djamhari Sirat 1, Arman D. Diponegoro

More information

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction

Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Pattern Recognition 40 (2007) 1270 1281 www.elsevier.com/locate/pr Preprocessing and postprocessing for skeleton-based fingerprint minutiae extraction Feng Zhao, Xiaoou Tang Department of Information Engineering,

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information

Automatic Licenses Plate Recognition System

Automatic Licenses Plate Recognition System Automatic Licenses Plate Recognition System Garima R. Yadav Dept. of Electronics & Comm. Engineering Marathwada Institute of Technology, Aurangabad (Maharashtra), India yadavgarima08@gmail.com Prof. H.K.

More information

A Hand Gesture-Based Method for Biometric Authentication

A Hand Gesture-Based Method for Biometric Authentication A Hand Gesture-Based Method for Biometric Authentication Satoru Imura and Hiroshi Hosobe Faculty of Computer and Information Sciences, Hosei University, Tokyo, Japan hosobe@acm.org Abstract. With the spread

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information