Evaluation of Biometric Systems. Christophe Rosenberger
|
|
- Joseph Wheeler
- 5 years ago
- Views:
Transcription
1 Evaluation of Biometric Systems Christophe Rosenberger
2 Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2
3 GREYC Lab Le pôle TES et le sans-contact Research Group in Computer science, Automatics, Image processing and Electronics of Caen Laboratory staff: 7 CNRS researchers 25 Full professors 11 Associate professors 56 Assistant professors 79 PhD students 17 permanent staff 30 Engineers and post-doc Research topics: Electronics Image processing Algorithmic Document analysis Multi-agents Robotics navigation Automatics Computer security Natural language processing Biometrics Cryptography 3
4 GREYC Lab E-payment & biometrics research unit E-transactions ( E-secure Transactions Cluster) 4
5 Research topics Biometrics: Operational authentication that respects the privacy of users Le pôle TES et le sans-contact Biometric authentication (palm veins, keystroke dynamics ) Evaluation of biometric systems (acceptability, security ) Protection of biometrics (cancelable biometrics, smartcards ) GREYC Keystroke Keystroke dynamics authentication 5
6 Research topics Biometric systems Iris Finger Knuckle Print Face Keystroke dynamics Signature dynamics Fingerprint 6 Touch screen interaction Hand shape, palm vein
7 Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 7
8 Evaluation: a love story PhD thesis: «Adaptive segmentation: application to hyperspectral images» Application: Algae detection Questions: How to choose the best segmentation method for a type of region? How to validate my results? 8
9 Evaluation: a love story Supervised evaluation: relevance Use of an a priori information: Synthetic Easy to obtain (by construction), Not always representative. Expert Dedicated to an application, Costly. Image processing algorithm Reference 9
10 Evaluation: a love story Unsupervised evaluation: consistency Statistical parameters Example: PSNR, EQM Advantage Easy computation Automatic evaluation Image processing algorithm Drawback Difference with an expert jugment 10
11 Evaluation: a love story Segmentation 1 Segmentation 2 Which one is the best? Segmentation 3 Original image 11
12 Evaluation: a love story Paradox Compression: PSNR known as a poor metric but still used Segmentation : many metrics exist but not very often used Interpretation : needs to use a benchmark (not easy), very few metrics for the evaluation of a single result. Still a long way to go 12
13 Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 13
14 Evaluation Context Biometrics: high level application with well defined tasks Multiple organizations: BIOAPI consortium: development a biometric API standard (1998) National committee 37 (AFNOR): normalisation (2004) Three important aspects: Performance Security Usability 14
15 Evaluation 15 M. El-Abed, R. Giot, B. Hemery, J.-J. Schwartzmann, C. Rosenberger, "Towards the Security Evaluation of Biometric Authentication Systems", International Conference on Security Science and Technology (ICSST) 2011
16 Evaluation General process In order to quantify the efficiency of a biometric system, we generally use two databases: Learning database 1-Learning database: used for the enrolment of individuals (can use different captures for the model definition); Testing database 2-Testing database: used for verification or identification with captures of known individuals (impostors and genuine users). 16
17 Evaluation Performance evaluation FAR : False Acceptance Rate FRR : False Rejection Rate EER : Equal Error Rate FAR ROC curve: FRR vs FAR EER AUC : Area under the curve FRR 17
18 Evaluation Data for the tests: Real users: time consuming, operators are needed Benchmark databases: Large datasets allowing a relative comparison Different formats, naming conventions Lots of computations (scenarios, size of the database ) Sometimes not free 18
19 Evaluation 19 J. Mahier, B. Hemery, M. El Abed, M. El-Allam, M. Bouhaddaoui, C. Rosenberger. «Computation EvaBio: A Tool for Performance Evaluation in Biometrics», International Journal of Automated Identification Technology (IJAIT), 2011.
20 Evaluation Security audit 20 M. El-Abed, P. Lacharme, and C. Rosenberger, "Security EvaBio: An Analysis Tool for the Security Evaluation of Biometric Authentication Systems", the 5th IAPR/IEEE International Conference on Biometrics (ICB), New Delhi, India, p. 1-6, 2012.
21 Evaluation Usability analysis 21 M. El Abed, R. Giot, B. Hemery, C. Rosenberger, «Evaluation of Biometric Systems : A Study of Users' Acceptance and Satisfaction» Inderscience International Journal of Biometrics (IJBM), pages 1-27, 2011.
22 Evaluation Update strategies analysis Performance analysis of an update strategy method for keystroke dynamics considering attacks 22 R. Giot, B. Dorizzi, C. Rosenberger, "Analysis of Template Update Strategies for Keystroke Dynamics", SSCI 2011 CIBIM IEEE Workshop on Computational Intelligence in Biometrics and Identity Management 2011
23 Evaluation Evaluation of cancelable biometric systems 23 R. Belguechi, E. Cherrier, M. El Abed and C. Rosenberger, "Evaluation of Cancelable Biometric Systems : Application to Finger-Knuckle-Prints", IEEE International Conference on Handbased Biometrics, 2011
24 Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 24
25 Quality of biometric data Objective Quantifying the quality of a biometric raw data to optimize the performance of biometric systems 25 Patrick Grother, Elham Tabassi, "Performance of Biometric Quality Measures", IEEE Transactions on Pattern Analysis and Machine Intelligence archive, Volume 29 Issue 4, April 2007
26 Quality of biometric data A generic approach Image quality Pattern-based quality Multi-class SVM Quality Image quality: blind evaluation (without any reference) Pattern-based quality: is there any interesting information in the image for the recognition? 26 M. EL-Abed, B. Hemery, C. Charrier, and C. Rosenberger, "Evaluation de la qualité de données biométriques", RNTI journal, special issue on "Qualité des Données et des Connaissances", p. 1-22, 2011.
27 Quality of biometric data Image quality BLIINDS [2] is a NR-IQ index combining three kinds of information: Contrast distortion (v1) Structure distortion (v2) Anisotropy orientation (v3 & v4) BLIINDS is entirely based on a DCT framework It uses local DCT patch of size 17*17 to calculate the three information For each patch k Local contrast (pooled -> v1) Kurtosis of the non-dct coefficients (pooled -> v2) 2 measures based on Renyi Entropy (pooled -> v3 & v4) 27 M. Saad, A. C. Bovik and C. Charrier, A DCT statistics-based blind image quality index, IEEE Signal Processing Letters, 2010.
28 Quality of biometric data Pattern-based quality The Scale-Invariant Feature Transform (SIFT) SIFT (X, Y) Scale Descriptor (128- elements) 1) Number of keypoints detected from the image 2) DC coefficient of the m-by-n descriptors matrix (m = number of the keypoints detected and n = 128) 3) and 4) mean and standard deviation of scales 28 D. G. Lowe, Distinctive image features from scale-invariant keypoints. International journal of computer vision, 2004.
29 Quality of biometric data Benchmark databases Database Individuals/samples FACES / 20 ENSIB 100 / 40 FERET 725 / average of 11 AR 120 / 26 29
30 Quality of biometric data Synthetic alterations a) Blurring alteration b) Gaussian noise alteration c) Resize alteration An example of alterations for a reference image from FACES94. From left to right, reference image then alteration level 1, 2 and 3 30
31 EER (%) Quality of biometric data EER evolution Good Fair Poor Very poor
32 Quality of biometric data Validation A good metric should be able to predict the performance of the biometric system based on the quality category Database Good Fair Poor Very poor FACES ENSIB FERET The predicted EER /real EER values for each quality set 32 P. Grother and E. Tabassi. Performance of biometric quality measures. IEEE Transactions on Pattern Analysis and Machine Intelligence (PAMI), p , 2007.
33 Quality of biometric data Comparison with NFIQ Use the FVC2002 Db2 database (100 individuals, 8 samples) Kolmogorov-Smirnov test on the intraclass and interclass distributions Method Good Fair Poor Very poor Contribution NFIQ Kolmogorov-Smirnov (KS) test of the genuine and impostor scores distribution 33 M. El Abed, R. Giot, B. Hemery, C. Charrier, C. Rosenberger, "A SVM-Based Model for the evaluation of biometric sample quality" SSCI 2011 CIBIM IEEE Workshop on Computational Intelligence in Biometrics and Identity Management 2011.
34 Quality of biometric data Applications Optimization of the enrolment process Comparison of biometric sensors Use quality information in soft biometrics approaches Use quality as a weighting factor in multibiometrics 34
35 Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 35
36 Conclusion Evaluation of biometric systems: a major trend Transfer to industry Make the users confident in the technology Facilitate the work for researchers Perspectives: Certification process for biometric systems? Biometrics Alliance Initiative 36
37 37
Evaluation of Biometric Systems
Evaluation of Biometric Systems Mohamad El-Abed, Christophe Charrier To cite this version: Mohamad El-Abed, Christophe Charrier. Evaluation of Biometric Systems. New Trends and Developments in Biometrics,
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationImpact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function
Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,
More informationISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique
TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationCAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY?
CAN NO-REFERENCE IMAGE QUALITY METRICS ASSESS VISIBLE WAVELENGTH IRIS SAMPLE QUALITY? Xinwei Liu 1,2,, Marius Pedersen 2, Christophe Charrier 1, and Patrick Bours 2 1 Normandie Univ, UNICAEN, ENSICAEN,
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationAPPENDIX 1 TEXTURE IMAGE DATABASES
167 APPENDIX 1 TEXTURE IMAGE DATABASES A 1.1 BRODATZ DATABASE The Brodatz's photo album is a well-known benchmark database for evaluating texture recognition algorithms. It contains 111 different texture
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationRoll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database
Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using
More informationAbstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.
An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationSoftware Development Kit to Verify Quality Iris Images
Software Development Kit to Verify Quality Iris Images Isaac Mateos, Gualberto Aguilar, Gina Gallegos Sección de Estudios de Posgrado e Investigación Culhuacan, Instituto Politécnico Nacional, México D.F.,
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationRecent research results in iris biometrics
Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre
More informationAn Enhanced Biometric System for Personal Authentication
IOSR Journal of Electronics and Communication Engineering (IOSR-JECE) e-issn: 2278-2834,p- ISSN: 2278-8735. Volume 6, Issue 3 (May. - Jun. 2013), PP 63-69 An Enhanced Biometric System for Personal Authentication
More informationA Novel Image Deblurring Method to Improve Iris Recognition Accuracy
A Novel Image Deblurring Method to Improve Iris Recognition Accuracy Jing Liu University of Science and Technology of China National Laboratory of Pattern Recognition, Institute of Automation, Chinese
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationSecond Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security
Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS
More informationAn Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander Kant 2
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 02, 2015 ISSN (online): 2321-0613 An Introduction to Multimodal Biometric System: An Overview Mamta Ahlawat 1 Dr. Chander
More informationResearch on Friction Ridge Pattern Analysis
Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute
More informationABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA
ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationThoughts on Fingerprint Image Quality and Its Evaluation
Thoughts on Fingerprint Image Quality and Its Evaluation NIST November 7-8, 2007 Masanori Hara Recap from NEC s Presentation at Previous Workshop (2006) n Positioning quality: a key factor to guarantee
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,
More informationA New Scheme for No Reference Image Quality Assessment
Author manuscript, published in "3rd International Conference on Image Processing Theory, Tools and Applications, Istanbul : Turkey (2012)" A New Scheme for No Reference Image Quality Assessment Aladine
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationFingerprint Segmentation using the Phase of Multiscale Gabor Wavelets
CCV: The 5 th sian Conference on Computer Vision, 3-5 January, Melbourne, ustralia Fingerprint Segmentation using the Phase of Multiscale Gabor Wavelets Sylvain Bernard,, Nozha Boujemaa, David Vitale,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationEmpirical Study on Quantitative Measurement Methods for Big Image Data
Thesis no: MSCS-2016-18 Empirical Study on Quantitative Measurement Methods for Big Image Data An Experiment using five quantitative methods Ramya Sravanam Faculty of Computing Blekinge Institute of Technology
More informationMATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES
MATLAB DIGITAL IMAGE/SIGNAL PROCESSING TITLES -2018 S.NO PROJECT CODE 1 ITIMP01 2 ITIMP02 3 ITIMP03 4 ITIMP04 5 ITIMP05 6 ITIMP06 7 ITIMP07 8 ITIMP08 9 ITIMP09 `10 ITIMP10 11 ITIMP11 12 ITIMP12 13 ITIMP13
More informationFeature Level Two Dimensional Arrays Based Fusion in the Personal Authentication system using Physiological Biometric traits
1 Biological and Applied Sciences Vol.59: e16161074, January-December 2016 http://dx.doi.org/10.1590/1678-4324-2016161074 ISSN 1678-4324 Online Edition BRAZILIAN ARCHIVES OF BIOLOGY AND TECHNOLOGY A N
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationQUALITY ASSESSMENT OF IMAGES UNDERGOING MULTIPLE DISTORTION STAGES. Shahrukh Athar, Abdul Rehman and Zhou Wang
QUALITY ASSESSMENT OF IMAGES UNDERGOING MULTIPLE DISTORTION STAGES Shahrukh Athar, Abdul Rehman and Zhou Wang Dept. of Electrical & Computer Engineering, University of Waterloo, Waterloo, ON, Canada Email:
More informationPresentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study
215 11th International Conference on Signal-Image Technology & Internet-Based Systems Presentation Attack Detection Algorithms for Finger Vein Biometrics: A Comprehensive Study R. Raghavendra Christoph
More informationCity Research Online. Permanent City Research Online URL:
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable
More informationBiometric Signature for Mobile Devices
Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationWavelet-based Image Splicing Forgery Detection
Wavelet-based Image Splicing Forgery Detection 1 Tulsi Thakur M.Tech (CSE) Student, Department of Computer Technology, basiltulsi@gmail.com 2 Dr. Kavita Singh Head & Associate Professor, Department of
More informationCustom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy
Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy Mario Konrad 1,HerbertStögner 1, and Andreas Uhl 1,2 1 School of Communication Engineering for
More informationAN IMPROVED NO-REFERENCE SHARPNESS METRIC BASED ON THE PROBABILITY OF BLUR DETECTION. Niranjan D. Narvekar and Lina J. Karam
AN IMPROVED NO-REFERENCE SHARPNESS METRIC BASED ON THE PROBABILITY OF BLUR DETECTION Niranjan D. Narvekar and Lina J. Karam School of Electrical, Computer, and Energy Engineering Arizona State University,
More informationEdge Histogram Descriptor for Finger Vein Recognition
Edge Histogram Descriptor for Finger Vein Recognition Yu Lu 1, Sook Yoon 2, Daegyu Hwang 1, and Dong Sun Park 2 1 Division of Electronic and Information Engineering, Chonbuk National University, Jeonju,
More informationAuthentication using Iris
Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College
More informationInvestigation of Recognition Methods in Biometrics
Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.
More informationLearning Hierarchical Visual Codebook for Iris Liveness Detection
Learning Hierarchical Visual Codebook for Iris Liveness Detection Hui Zhang 1,2, Zhenan Sun 2, Tieniu Tan 2, Jianyu Wang 1,2 1.Shanghai Institute of Technical Physics, Chinese Academy of Sciences 2.National
More informationQuantitative Assessment of the Individuality of Friction Ridge Patterns
Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University
More informationA Review: No-Reference/Blind Image Quality Assessment
A Review: No-Reference/Blind Image Quality Assessment Patel Dharmishtha 1 Prof. Udesang.K.Jaliya 2, Prof. Hemant D. Vasava 3 Dept. of Computer Engineering. Birla Vishwakarma Mahavidyalaya V.V.Nagar, Anand
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationGlobal and Local Quality Measures for NIR Iris Video
Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu
More informationFingerprint Image Quality Parameters
Fingerprint Image Quality Parameters Muskan Sahi #1, Kapil Arora #2 12 Department of Electronics and Communication 12 RPIIT, Bastara Haryana, India Abstract The quality of fingerprint image determines
More informationStandard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses
Standard Fingerprint Databases Manual Mehmet Kayaoglu, Berkay Topcu, Umut Uludag TUBITAK BILGEM, Informatics and Information Security Research Center, Turkey {mehmet.kayaoglu, berkay.topcu, umut.uludag}@tubitak.gov.tr
More informationComparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners
Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationColor Image Segmentation Using K-Means Clustering and Otsu s Adaptive Thresholding
Color Image Segmentation Using K-Means Clustering and Otsu s Adaptive Thresholding Vijay Jumb, Mandar Sohani, Avinash Shrivas Abstract In this paper, an approach for color image segmentation is presented.
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationLinear Gaussian Method to Detect Blurry Digital Images using SIFT
IJCAES ISSN: 2231-4946 Volume III, Special Issue, November 2013 International Journal of Computer Applications in Engineering Sciences Special Issue on Emerging Research Areas in Computing(ERAC) www.caesjournals.org
More informationThe 2019 Biometric Technology Rally
DHS SCIENCE AND TECHNOLOGY The 2019 Biometric Technology Rally Kickoff Webinar, November 5, 2018 Arun Vemury -- DHS S&T Jake Hasselgren, John Howard, and Yevgeniy Sirotin -- The Maryland Test Facility
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationHaptic-Based Biometrics: A Feasibility Study
Haptic-Based Biometrics: A Feasibility Study Yednek Asfaw, Mauricio Orozco, Shervin Shirmohammadi, Andy Adler, and Abdulmotaleb El Saddik School of Information Technology and Engineering University of
More informationRank 50 Search Results Against a Gallery of 10,660 People
Market Comparison Summary This document provides a comparison of Aurora s face recognition accuracy against other biometrics companies and academic institutions. Comparisons against three major benchmarks
More informationNo-reference Synthetic Image Quality Assessment using Scene Statistics
No-reference Synthetic Image Quality Assessment using Scene Statistics Debarati Kundu and Brian L. Evans Embedded Signal Processing Laboratory The University of Texas at Austin, Austin, TX Email: debarati@utexas.edu,
More information3D Face Recognition System in Time Critical Security Applications
Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications
More informationAlgorithm for Detection and Elimination of False Minutiae in Fingerprint Images
Algorithm for Detection and Elimination of False Minutiae in Fingerprint Images Seonjoo Kim, Dongjae Lee, and Jaihie Kim Department of Electrical and Electronics Engineering,Yonsei University, Seoul, Korea
More informationACADEMIC YEAR
INTERNATIONAL JOURNAL SL.NO. NAME OF THE FACULTY TITLE OF THE PAPER JOURNAL DETAILS 1 Dr.K.Komathy 2 Dr.K.Komathy 3 Dr.K. Komathy 4 Dr.G.S.Anandha Mala 5 Dr.G.S.Anandha Mala 6 Dr.G.S.Anandha Mala 7 Dr.G.S.Anandha
More informationHuman Recognition Using Biometrics: An Overview
Human Recognition Using Biometrics: An Overview Arun Ross 1 and Anil K. Jain 2 1 Lane Department of Computer Science and Electrical Engineering, West Virginia University, Morgantown, WV 26506 arun.ross@mail.wvu.edu
More informationFastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC)
FastPass A Harmonized Modular Reference System for Automated Border Crossing (ABC) EAB - Research Project Conference, Darmstadt, September 19 th, 2016 Presented by Markus Clabian Senior Research Engineer,
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationBook Cover Recognition Project
Book Cover Recognition Project Carolina Galleguillos Department of Computer Science University of California San Diego La Jolla, CA 92093-0404 cgallegu@cs.ucsd.edu Abstract The purpose of this project
More informationA study of users acceptance and satisfaction of biometric systems
A study of users acceptance and satisfaction of biometric systems Mohamad El-Abed, Romain Giot, Baptiste Hemery, Christophe Rosenberger To cite this version: Mohamad El-Abed, Romain Giot, Baptiste Hemery,
More informationHYBRID HAND-DIRECTIONAL GESTURES FOR BAIOMETRIC BASED ON AREA FEATURE EXTRACTION AND EXPERT SYSTEM
5 th December 07. Vol.95. No ISSN: 99-8645 www.jatit.org E-ISSN: 87-95 HYBRID HAND-DIRECTIONAL GESTURES FOR BAIOMETRIC BASED ON AREA FEATURE EXTRACTION AND EXPERT SYSTEM FAHAD LAYTH MALALLAH, BARAA T.
More informationSemantic Localization of Indoor Places. Lukas Kuster
Semantic Localization of Indoor Places Lukas Kuster Motivation GPS for localization [7] 2 Motivation Indoor navigation [8] 3 Motivation Crowd sensing [9] 4 Motivation Targeted Advertisement [10] 5 Motivation
More informationCOMPARATIVE PERFORMANCE ANALYSIS OF HAND GESTURE RECOGNITION TECHNIQUES
International Journal of Advanced Research in Engineering and Technology (IJARET) Volume 9, Issue 3, May - June 2018, pp. 177 185, Article ID: IJARET_09_03_023 Available online at http://www.iaeme.com/ijaret/issues.asp?jtype=ijaret&vtype=9&itype=3
More informationImpact of the subjective dataset on the performance of image quality metrics
Impact of the subjective dataset on the performance of image quality metrics Sylvain Tourancheau, Florent Autrusseau, Parvez Sazzad, Yuukou Horita To cite this version: Sylvain Tourancheau, Florent Autrusseau,
More informationA Study of Distortion Effects on Fingerprint Matching
A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department
More informationIssues in rotational (non-)invariance and image preprocessing
Issues in rotational (non-)invariance and image preprocessing Lalit Jain 1, Michael J. Wilber 1,2, Terrance E. Boult 1,2 1 VAST Lab, University of Colorado Colorado Springs 2 Securics Inc {ljain2 mwilber
More informationLittle Fingers. Big Challenges.
Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint
More informationPerformance Analysis of Multimodal Biometric System Authentication
290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute
More informationThe Role of Biometrics in Virtual Communities. and Digital Governments
The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024
More informationTemplate Ageing and Quality Analysis in Time-Span separated Fingerprint Data
Template Ageing and Quality Analysis in Time-Span separated Fingerprint Data Simon Kirchgasser Department of Computer Sciences University of Salzburg Jakob-Haringer-Str. 2 5020 Salzburg, AUSTRIA skirch@cosy.sbg.ac.at
More informationCHAPTER 1 INTRODUCTION
1 CHAPTER 1 INTRODUCTION 1.1 BACKGROUND The increased use of non-linear loads and the occurrence of fault on the power system have resulted in deterioration in the quality of power supplied to the customers.
More informationBiometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns
Biometric Authentication Using Fast Correlation of Near Infrared Hand Vein Patterns Mohamed Shahin, Ahmed Badawi, and Mohamed Kamel Abstract This paper presents a hand vein authentication system using
More information