The Use of Static Biometric Signature Data from Public Service Forms

Size: px
Start display at page:

Download "The Use of Static Biometric Signature Data from Public Service Forms"

Transcription

1 The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK Abstract. Automatic signature verification/recognition is a commonly used form of biometric authentication. Signatures are typically provided for legal purposes on public service application forms but not used for subsequent biometric recognition. This paper investigates a number of factors concerning the use of signatures in so-called static form (an image of a completed signature) to enable the sample to be used as stand-alone or supplementary data alongside other biometric modalities. Specifically we investigate common sizes of unconstrained signatures within a population, assess the size of application form signing areas with respect to potential constraints and finally investigate performance issues of how constrained and unconstrained enrolment signature data from forms can be accurately matched against constrained and unconstrained verification data, representing the full range of usage scenarios. The study identifies that accuracy can be maintained when constrained signatures data is verified against other constrained samples while the best performance occurs when unconstrained signatures are used for both enrolment and verification. Keywords: Signature biometrics, static feature analysis, form design. 1 Introduction The human signature is a widely used and accepted form of personal authentication with application areas spanning a multitude of everyday domains (including retail and legal) [1],[2],[3]. Signature also has widespread use within automatic biometric analysis solutions alongside other modalities such as fingerprint, face and iris recognition [4]. Despite comparable performance in terms of verification error rates, signature does not enjoy the market share of other modalities within large scale deployment applications such as national identity cards or border documentation (for example passports or visas) for which face and fingerprint are often primary choices [5]. These modalities require specific capture and enrolment equipment often meaning that enrolees have to attend a specific site (in the case of fingerprints) or donate samples to a particular predefined specification (in the case of facial images). Applications for official identify documentation are almost always made using a paper form on which the applicant has to sign (usually for legal purpose regarding use of data and consent). Using this signature data in a static/image format may be fully integrated C. Vielhauer et al. (Eds.): BioID 2011, LNCS 6583, pp , Springer-Verlag Berlin Heidelberg 2011

2 74 E. Johnson and R. Guest into the verification process as additional data readily available to enhance the biometric process alongside the primary biometrics collected for the application [6]. This study aims to assess several key aspects of the use of this supplementary static biometric signature data collected on application forms. Specifically, we firstly focus on the design of common application form signing areas with respect to the range of human signature sizes (both Western and non-western) to investigate if constraints are imposed which will affect normal signature production. By using a specially collected signature dataset we will secondly investigate verification performance rates of constrained and unconstrained static signatures using a common static signature verification engine. This second experiment will lead to an understanding of performance issues as to how both constrained and unconstrained (enrolment) signature data from forms can be accurately matched against constrained and unconstrained verification data, representing the full range of usage scenarios. 2 Methodology To investigate the effects of signature size, form-based constraints and verification performance, three separate stages to the experiment were conducted. 2.1 Stage 1 Unconstrained Signature Size Analysis Throughout the investigation a new dataset was used which comprised of 150 signers who were asked to donate four separate instances of their signature on individual blank A4 sheets of paper, which, when scanned, formed an unconstrained subset of static signature images. The data collection took signature samples in a single session, and the images were scanned using an HP Scanjet 8250 at a resolution of 600dpi and a bit depth of 24. The images were stored in jpeg format. The signers donating to the dataset were from both Western and non-western first writing languages. Out of 150 donors, 15 had a non-western first writing language, and 135 a Western first writing language. The first writing languages of the subjects in the datasets were: English (122 participants), Russian (6 participants), Chinese, German, French and Greek (2 participants each), and Kurdish, Italian, Polish, Basque, Spanish, Thai, Hebrew, Arabic, Hindi, Albanian, Dutch, Welsh, Portuguese and Romanian (1 participant each). As an initial investigation, the physical height and width of all 600 (4 signatures x 150 signers) unconstrained signatures was measured by assessing the ink pixel extents in the x and y axes and converting into mm. In this way it was possible to analyse the average and range of signatures across a representative population. Furthermore, by separating the 150 signers according to whether their first writing language was Western and non-western it is possible to investigate the broad effects on ethnicity, which can be important meta-information within signature assessment. 2.2 Stage 2 Form Signing Areas Having established typical ranges of unconstrained signature sizes, the second stage of experimentation assessed a variety of public service application forms to note the box/area sizes provided for signature donation. Whilst it is acknowledged that the

3 The Use of Static Biometric Signature Data from Public Service Forms 75 signatures donated in these areas are purely for legal completion of the application, in the context of this work by reviewing the sizes for signature donation it will be possible to ascertain whether boxes are constraining typical signature sizes (through a comparison with the result from Stage 1). In this experiment a total of 98 signature donation boxes/spaces from 56 public service application forms were measured. These forms include UK, EU and US application forms for services such as entry visa application, naturalisation, passport and driving license applications. The forms were chosen as they are in the public domain and are for a range of secure applications that could benefit from the use of biometric signature recognition. Signing box areas were obtained by physically measuring the areas on each form. If no physical bounding box was present, the extents were defined by text or other bounding objects on the form. 2.3 Stage 3 Constrained Static Signature Verification To assess the effects of form constraints on static signature verification, signers donating to the dataset outlined in Stage 1 (Section 2.1) also signed eight sheets (with a single signature per sheet) with a signature donation box with dimensions 80mm by 30mm. This box size, when compared with the average box sizes on public service forms, is rather large, suggesting that any effects of constraining the signature would be amplified when using some of the forms measured in Stage 2 (Section 2.2). The constrained signatures were gathered using an identical method to the unconstrained signatures and were scanned using the same device and resolution. They were also taken in the same session as the unconstrained images and then stored in jpeg format. The constrained signatures were measured in the x and y direction, as the unconstrained signatures had been, to assess how much constraining the signature affected the size of the static signature sample. The results of this can be found later in the paper. 2.4 Stage 4 Four Way Matching Experiments Having both constrained and unconstrained signatures from 150 subjects enabled all four possible real-life combinations of static assessment: Scenario 1: Unconstrained enrolment vs. unconstrained verification Scenario 2: Unconstrained enrolment vs. constrained verification Scenario 3: Constrained enrolment vs. unconstrained verification Scenario 4: Constrained enrolment vs. constrained verification Four separate experiments were conducted representing the above scenarios. The experiments followed the same methodology: Four signatures were used to form an enrolment template against which a series of four genuine signatures per scenario were verified. This was followed by four false signatures verified against the enrolment template. The false signatures were unskilled forgeries taken from other users signatures so as to maintain the scenarios of constrained or unconstrained images. The verification algorithm used outputted a distance metric, which was used to create a ROC curve and identify the error rates for each scenario. The static ASV

4 76 E. Johnson and R. Guest system used for these experiments was an algorithm which calculates the signature bounding envelope and interior strokes using a range of geometric polar and Cartesian features as inputs to a Euclidean distance measure [7]. This method was used to assess the signatures because of the proven high performing nature of the algorithm. For these experiments it was treated as a black-box in that the algorithm was not optimised for performance. 3 Results 3.1 Stage 1 Unconstrained Signature Size Analysis In the first set of experiments the sizes of four constrained signatures from 150 subjects were determined. Table 1 and Figure 1 show the statistics for unconstrained images, divided into all signatures, those submitted by people whose native writing language was of a western style, and those whose native writing language was of a non-western style. Table 1. Mean, minimum and maximum values for unconstrained signatures Writing Language Axis Mean (mm) Min (mm) Max (mm) All x y Western x y Non-Western x y Signature size in y axis (mm) Non Western Western Signature size in x axis (mm) Fig. 1. x and y size values of unconstrained signatures

5 The Use of Static Biometric Signature Data from Public Service Forms 77 As can be seen, there is considerable variation between signature sizes, which may make optimum form design difficult. However, if the most important issue is that the signatures do not get deformed when scaled down, an average ratio between the sizes of the signature could be useful so as to design a box of the appropriate proportions. In assessing the signatures of Western participants in the dataset the ratio would be approximately 1:3 (height to width across all signatures). If this ratio is adhered to, deformation of constrained signatures could possibility be minimized. 3.2 Stage 2 Form Signing Areas With reference to above unconstrained signature sizes, the box/signing area sizes found on 98 signature donation boxes/spaces from 56 public standard public service forms were analysed to see how they compared. The statistics for the forms examined are shown in Table 2 and Figure 2. Table 2. Signing area sizes found on standard public service forms Axis Mean (mm) Min (mm) Max (mm) x y Box size in y axis (mm) Box size in x axis (mm) Box Sizes Fig. 2. x and y size values of constraining boxes on public service forms As can be seen, the smallest size of a box in the y direction was a mere 3mm, which is smaller than even the minimum constrained signature height. The boxes exhibited a range of proportionality, some were very long and narrow, (Figure 3, IAP-66), while others were short and wide (Figure 4, I-17). More examples of boxes found on standard forms are shown in Figures 5, 6 and 7, which all come from the same form, (N644) showing that, not only are these forms not standardised across an agency or country, but in some cases, they are not even standardised on the same form, leading to an inability for these boxes to reliably produce proportional signature data if used as multiple static signature enrolment data within the same enrolment session.

6 78 E. Johnson and R. Guest Fig. 3. Signature box from US form IAP-66 Exchange Visitor Visa Application Fig. 4. Signature box from US form I-17- Petition for Approval of School for Attendance by Non-Immigrant Student Fig. 5. Signature box from US form N644 Application for Posthumous Citizenship Fig. 6. Signature box from US form N644 Application for Posthumous Citizenship Fig. 7. Signature box from US form N644 Application for Posthumous Citizenship 3.3 Stage 3 Constrained Static Signature Verification Having established that constraining boxes are often smaller or differently proportioned to an unconstrained signature, it was necessary to identify if constraining the signature

7 The Use of Static Biometric Signature Data from Public Service Forms 79 significantly distorted the signature to the point of affecting the accuracy of automatic signature verification. The size statistics of signatures in constraining boxes are shown in Table 3 and Figure 8, divided into sub-categories of all signatures, those submitted by people whose native writing language was of a Western style, and those whose native writing language was of a non-western style. As can be seen from these data, the unconstrained signatures were generally of a larger size than the constrained. An ANOVA analysis determined that in the x direction, the differences were not statistically different, but in the y direction, there was a significant variation. This shows that not only does the y direction vary in size depending on whether the signature is constrained or unconstrained, but that it varies more than in the x direction, meaning that the signature itself is being deformed to different proportions when restricted to a box. This data is from signatures constrained in boxes that were fairly large (80mm x 30mm) compared to the majority of the boxes found in standard forms that are publically used, so this effect would be even higher for many of the boxes currently used. Table 3. Mean, minimum and maximum values for constrained signatures Nationality Axis Mean (mm) Min (mm) Max (mm) All x y Western x y Non-Western x y Signature size in y axis (mm) Non Western Western Signature size in x axis (mm) Fig. 8. x and y size values of constrained signatures

8 80 E. Johnson and R. Guest It should also be noted that there are some outlying values within this data on examining these outlying images it was discovered that some participants had attempted to fill the box with their signature, introducing a further donation method of distorting the signature. As constraining a signature will deform the static image, a performance assessment was undertaken to examine whether this distortion would affect the accuracy of a static signature verification system. Four-way matching was applied examining the results of unconstrained enrolment images with unconstrained verification images (Scenario 1), unconstrained enrolment images with constrained verification images (Scenario 2), constrained enrolment images with unconstrained verification images (Scenario 3) and constrained enrolment images with constrained verification images (Scenario 4). The results of these experiments can be found in Table 4 and Figure 9. Table 4. Performance Evaluation of Constrained vs. Unconstrained Static Signature Verification Using a Four-Way Match Error Rate Scenario 1 Scenario 2 Scenario 3 EER FAR FRR Scenario 4 1 True Positive Rate Scenario 1 Scenario 2 Scenario 3 Scenario False Positive Rate Fig. 9. ROC Curves to Show Performance Evaluation of Constrained vs. Unconstrained Static Signature Verification Using a Four-Way Match From these results, we can see that the constraining of a signature had a fairly minor effect on system accuracy, when both the enrolment and verification images are both constrained to the same level. However, as soon as one image was constrained

9 The Use of Static Biometric Signature Data from Public Service Forms 81 and the other unconstrained, particularly if enrolment was constrained but verification unconstrained, as in Scenario 3, the accuracy was severely affected. 4 Conclusions In this study it has been determined that when people are constrained as to the amount of space they have to sign, their signature will deform, particularly in the y axis. This occurs even when the constraining box is larger than the person s unconstrained signature. It is also possible to ascertain that when signature images are constrained, static verification system accuracy is adversely affected. While, in our experimental system both enrolment and verification images are constrained in the same size box, the equal error rate is 6.9%, the accuracy of the system is improved to an equal error rate of 5.9% when neither image is constrained. When either the enrolment or verification samples are constrained, and the other samples unconstrained, accuracy ratings drop considerably (especially when the enrolment template is constrained and the comparison unconstrained, where the error rate rises to 12.5%). The constrained sample results in this work were obtained using a constraining box of the size 80mm x 30mm. The size of this box in the x axis approximates to the mean of the boxes found on public forms in common usage, however, the size of the box in the y axis is significantly larger than even the largest box found on a public form. This form constraint is likely to cause even more reduction in accuracy for a biometric system as the y axis was the dimension varying the most between constrained and unconstrained signatures. While constraining signatures on boxes will allow for more space on a form, and, if the signature is being stored in a raw image format will lead to a smaller template size, careful thought should be given to the use of constraints on any signature that is to be used for biometric authentication as the accuracy of the system will be adversely affected by constraining the user s signature. In terms of the practical application of signature systems utilising static signature data to supplement primary authentication data (biometric or otherwise), this work has identified a number of key findings: Firstly, we have identified average signature size (and ranges) from a large population and surveyed how these compare with signing areas on a cross-section of common public service application forms. By noting the relative performance of constrained and unconstrained signatures we can identify that accuracy is maintained if constrained signatures are used for both enrolment and verification. Using form constrained signatures for enrolment and unconstrained for verification (Scenario 3 a typical implementation using forms at enrol time) produces sub-optimal results. Importantly the results show the possibility of form-based signatures either as a primary or supplementary biometric modality. References 1. Impedovo, D., Pirlo, G.: Automatic Signature Verification: The State of the Art. IEEE Trans. SMC-C 38(5), (2008) 2. Plamondon, R., Lorette, G.: Automatic signature verification and writer identification - the state of the art. Pattern Recognition 22(2), (1989)

10 82 E. Johnson and R. Guest 3. Leclerc, F., Plamondon, R.: Automatic signature verification: the state of the art Intl J. Pattern Recognition and Artificial Intelligence 8(3), (1994) 4. Jain, A.K., Ross, A., Prabhakar, S.: An Introduction to Biometric Recognition. IEEE Trans. Circuits and Systems for Video Technology, Special Issue on Image- and Video-Based Biometrics 14(1), 4 20 (2004) 5. Kwon, T., Moon, H.: Multi-modal Biometrics with PKI Technologies for Border Control Applications. In: Kantor, P., Muresan, G., Roberts, F., Zeng, D.D., Wang, F.-Y., Chen, H., Merkle, R.C. (eds.) ISI LNCS, vol. 3495, pp Springer, Heidelberg (2005) 6. Vielhauer, C., Scheidat, T.: Multimodal Biometrics for Voice and Handwriting. In: Dittmann, J., Katzenbeisser, S., Uhl, A. (eds.) CMS LNCS, vol. 3677, pp Springer, Heidelberg (2005) 7. Ferrer, M.A., Alonso, J.B., Travieso, C.M.: Offline Geometric Parameters for Automatic Signature Verification Using Fixed-Point Arithmetic. IEEE Trans. PAMI 27(6), (2005)

Distinguishing Identical Twins by Face Recognition

Distinguishing Identical Twins by Face Recognition Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The

More information

SVC2004: First International Signature Verification Competition

SVC2004: First International Signature Verification Competition SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.

IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION. IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,

More information

Static Signature Verification and Recognition using Neural Network Approach-A Survey

Static Signature Verification and Recognition using Neural Network Approach-A Survey Available online www.ejaet.com European Journal of Advances in Engineering and Technology, 2015, 2(4): 46-50 Review Article ISSN: 2394-658X Static Signature Verification and Recognition using Neural Network

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

Real time verification of Offline handwritten signatures using K-means clustering

Real time verification of Offline handwritten signatures using K-means clustering Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

An Offline Handwritten Signature Verification System - A Comprehensive Review

An Offline Handwritten Signature Verification System - A Comprehensive Review An Offline Handwritten Signature Verification System - A Comprehensive Review Ms. Deepti Joon 1, Ms. Shaloo Kikon 2 1 M. Tech. Scholar, Dept. of ECE, P.D.M. College of Engineering, Bahadurgarh, Haryana

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

American Community Survey 5-Year Estimates

American Community Survey 5-Year Estimates DP02 SELECTED SOCIAL CHARACTERISTICS IN THE UNITED STATES 2012-2016 American Community Survey 5-Year Estimates Supporting documentation on code lists, subject definitions, data accuracy, and statistical

More information

American Community Survey 5-Year Estimates

American Community Survey 5-Year Estimates DP02 SELECTED SOCIAL CHARACTERISTICS IN THE UNITED STATES 2011-2015 American Community Survey 5-Year Estimates Supporting documentation on code lists, subject definitions, data accuracy, and statistical

More information

Individuality of Fingerprints

Individuality of Fingerprints Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA

More information

Offline Signature Verification for Cheque Authentication Using Different Technique

Offline Signature Verification for Cheque Authentication Using Different Technique Offline Signature Verification for Cheque Authentication Using Different Technique Dr. Balaji Gundappa Hogade 1, Yogita Praful Gawde 2 1 Research Scholar, NMIMS, MPSTME, Associate Professor, TEC, Navi

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

A Study of Distortion Effects on Fingerprint Matching

A Study of Distortion Effects on Fingerprint Matching A Study of Distortion Effects on Fingerprint Matching Qinghai Gao 1, Xiaowen Zhang 2 1 Department of Criminal Justice & Security Systems, Farmingdale State College, Farmingdale, NY 11735, USA 2 Department

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Signature verification revisited:

Signature verification revisited: Signature verification revisited: promoting practical exploitation of biometric technology by MI C. Fairhurst Despite research over a long period, biometric approaches to authenticating personal identity

More information

Proposed Method for Off-line Signature Recognition and Verification using Neural Network

Proposed Method for Off-line Signature Recognition and Verification using Neural Network e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System

Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

Blur Estimation for Barcode Recognition in Out-of-Focus Images

Blur Estimation for Barcode Recognition in Out-of-Focus Images Blur Estimation for Barcode Recognition in Out-of-Focus Images Duy Khuong Nguyen, The Duy Bui, and Thanh Ha Le Human Machine Interaction Laboratory University Engineering and Technology Vietnam National

More information

Evaluation of Online Signature Verification Features

Evaluation of Online Signature Verification Features Evaluation of Online Signature Verification Features Ghazaleh Taherzadeh*, Roozbeh Karimi*, Alireza Ghobadi*, Hossein Modaberan Beh** * Faculty of Information Technology Multimedia University, Selangor,

More information

SELECTED SOCIAL CHARACTERISTICS IN THE UNITED STATES American Community Survey 5-Year Estimates

SELECTED SOCIAL CHARACTERISTICS IN THE UNITED STATES American Community Survey 5-Year Estimates DP02 SELECTED SOCIAL CHARACTERISTICS IN THE UNITED STATES 2010-2014 American Community Survey 5-Year Estimates Supporting documentation on code lists, subject definitions, data accuracy, and statistical

More information

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database

Roll versus Plain Prints: An Experimental Study Using the NIST SD 29 Database Roll versus Plain Prints: An Experimental Study Using the NIST SD 9 Database Rohan Nadgir and Arun Ross West Virginia University, Morgantown, WV 5 June 1 Introduction The fingerprint image acquired using

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE

MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Global and Local Quality Measures for NIR Iris Video

Global and Local Quality Measures for NIR Iris Video Global and Local Quality Measures for NIR Iris Video Jinyu Zuo and Natalia A. Schmid Lane Department of Computer Science and Electrical Engineering West Virginia University, Morgantown, WV 26506 jzuo@mix.wvu.edu

More information

Stamp detection in scanned documents

Stamp detection in scanned documents Annales UMCS Informatica AI X, 1 (2010) 61-68 DOI: 10.2478/v10065-010-0036-6 Stamp detection in scanned documents Paweł Forczmański Chair of Multimedia Systems, West Pomeranian University of Technology,

More information

The 2019 Biometric Technology Rally

The 2019 Biometric Technology Rally DHS SCIENCE AND TECHNOLOGY The 2019 Biometric Technology Rally Kickoff Webinar, November 5, 2018 Arun Vemury -- DHS S&T Jake Hasselgren, John Howard, and Yevgeniy Sirotin -- The Maryland Test Facility

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

Analyzing features learned for Offline Signature Verification using Deep CNNs

Analyzing features learned for Offline Signature Verification using Deep CNNs Accepted as a conference paper for ICPR 2016 Analyzing features learned for Offline Signature Verification using Deep CNNs Luiz G. Hafemann, Robert Sabourin Lab. d imagerie, de vision et d intelligence

More information

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE

DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE DETECTING OFF-LINE SIGNATURE MODEL USING WIDE AND NARROW VARIETY CLASS OF LOCAL FEATURE Agung Sediyono 1 and YaniNur Syamsu 2 1 Universitas Trisakti, Indonesia, trisakti_agung06@yahoo.com 2 LabFor Polda

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

Handwritten Signature Verification by Multiple Reference Sets

Handwritten Signature Verification by Multiple Reference Sets Handwritten Signature Verification by Multiple s D. Impedovo (^)( ), R. Modugno (*)( ),G. Pirlo (*)( ) (*) ( ), E. Stasolla (*) Dipartimento di Informatica Università degli Studi di Bari Via Orabona 4

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

Method for Real Time Text Extraction of Digital Manga Comic

Method for Real Time Text Extraction of Digital Manga Comic Method for Real Time Text Extraction of Digital Manga Comic Kohei Arai Information Science Department Saga University Saga, 840-0027, Japan Herman Tolle Software Engineering Department Brawijaya University

More information

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

Computational Intelligence in Digital Forensics: Forensic Investigation and Applications Signature-Based Biometric Authentication Author Pal, Srikanta, Pal, Umapada, Blumenstein, Michael Published 2014 Book Title Computational Intelligence in Digital Forensics: Forensic Investigation and Applications

More information

Biometric Signature for Mobile Devices

Biometric Signature for Mobile Devices Chapter 13 Biometric Signature for Mobile Devices Maria Villa and Abhishek Verma CONTENTS 13.1 Biometric Signature Recognition 309 13.2 Introduction 310 13.2.1 How Biometric Signature Works 310 13.2.2

More information

UTSig: A Persian Offline Signature Dataset

UTSig: A Persian Offline Signature Dataset UTSig: A Persian Offline Signature Dataset Amir Soleimani 1*, Kazim Fouladi 2, Babak N. Araabi 1, 3 1 Control and Intelligent Processing Center of Excellence, School of Electrical and Computer Engineering,

More information

High volume security printing using sheet-fed offset press

High volume security printing using sheet-fed offset press High volume security printing using sheet-fed offset press Slavtcho (Slavi) Bonev Epyxs GmbH Richard-Wagner-Str 29, 6816 Mannheim, Germany sbonev@epyxscom Abstract: Security printing based on DataGrid

More information

SUMMARY OF THE IMPACT ASSESSMENT

SUMMARY OF THE IMPACT ASSESSMENT EN EN EN EUROPEAN COMMISSION Brussels, 30.6.2010 SEC(2010) 797 COMMISSION STAFF WORKING DOCUMENT SUMMARY OF THE IMPACT ASSESSMENT Accompanying document to the Proposal for a COUNCIL REGULATION on the translation

More information

Fifteen Months Until Census Day: The Bureau is Preparing

Fifteen Months Until Census Day: The Bureau is Preparing Fifteen Months Until Census Day: The Bureau is Preparing National Conference of State Legislatures Washington, D.C. December 6, 2018 James Whitehorne Chief - Census Redistricting & Voting Rights Data Office

More information

Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy

Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy Custom Design of JPEG Quantisation Tables for Compressing Iris Polar Images to Improve Recognition Accuracy Mario Konrad 1,HerbertStögner 1, and Andreas Uhl 1,2 1 School of Communication Engineering for

More information

Wi-Fi Fingerprinting through Active Learning using Smartphones

Wi-Fi Fingerprinting through Active Learning using Smartphones Wi-Fi Fingerprinting through Active Learning using Smartphones Le T. Nguyen Carnegie Mellon University Moffet Field, CA, USA le.nguyen@sv.cmu.edu Joy Zhang Carnegie Mellon University Moffet Field, CA,

More information

City Research Online. Permanent City Research Online URL:

City Research Online. Permanent City Research Online URL: Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable

More information

Colored Rubber Stamp Removal from Document Images

Colored Rubber Stamp Removal from Document Images Colored Rubber Stamp Removal from Document Images Soumyadeep Dey, Jayanta Mukherjee, Shamik Sural, and Partha Bhowmick Indian Institute of Technology, Kharagpur {soumyadeepdey@sit,jay@cse,shamik@sit,pb@cse}.iitkgp.ernet.in

More information

A new seal verification for Chinese color seal

A new seal verification for Chinese color seal Edith Cowan University Research Online ECU Publications 2011 2011 A new seal verification for Chinese color seal Zhihu Huang Jinsong Leng Edith Cowan University 10.4028/www.scientific.net/AMM.58-60.2558

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK NC-FACE DATABASE FOR FACE AND FACIAL EXPRESSION RECOGNITION DINESH N. SATANGE Department

More information

Postprint.

Postprint. http://www.diva-portal.org Postprint This is the accepted version of a paper presented at IEEE Intl. Conf. on Control, Automation, Robotics and Vision, ICARCV, Special Session on Biometrics, Singapore,

More information

Detailed Instructions for Obtaining the UK Tier 4 Student Prior Entry Clearance (visa) (Updated May )

Detailed Instructions for Obtaining the UK Tier 4 Student Prior Entry Clearance (visa) (Updated May ) Detailed Instructions for Obtaining the UK Tier 4 Student Prior Entry Clearance (visa) (Updated May 22 2013) It is very important that you read these instructions carefully and refer to them as you complete

More information

Research on Friction Ridge Pattern Analysis

Research on Friction Ridge Pattern Analysis Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute

More information

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches

Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Empirical Evidence for Correct Iris Match Score Degradation with Increased Time-Lapse between Gallery and Probe Matches Sarah E. Baker, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame {sbaker3,kwb,flynn}@cse.nd.edu

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

Complexity-based Biometric Signature Verification

Complexity-based Biometric Signature Verification Complexity-based Biometric Signature Verification Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Julian Fierrez and Javier Ortega-Garcia Biometrics and Data Pattern Analytics (BiDA) Lab - ATVS, Escuela

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

V I S O c o r e I n s p e c t

V I S O c o r e I n s p e c t V I S O c o r e I n s p e c t S o f t wa r e s o l u t i o n f o r s e c u r e d o c u m e n t v e r i f i c at i o n Passports and ID cards prove our identity. In order to improve and facilitate the verification

More information

Human Identifier Tag

Human Identifier Tag Human Identifier Tag Device to identify and rescue humans Teena J 1 Information Science & Engineering City Engineering College Bangalore, India teenprasad110@gmail.com Abstract If every human becomes an

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

E-Invigilator: A biometric-based supervision system for e-assessments

E-Invigilator: A biometric-based supervision system for e-assessments Edith Cowan University Research Online ECU Publications 2013 2013 E-Invigilator: A biometric-based supervision system for e-assessments Nathan L. Clarke Edith Cowan University P Dowland Steven M. Furnell

More information

Feature Extraction of Human Lip Prints

Feature Extraction of Human Lip Prints Journal of Current Computer Science and Technology Vol. 2 Issue 1 [2012] 01-08 Corresponding Author: Samir Kumar Bandyopadhyay, Department of Computer Science, Calcutta University, India. Email: skb1@vsnl.com

More information

Multimodal Face Recognition using Hybrid Correlation Filters

Multimodal Face Recognition using Hybrid Correlation Filters Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com

More information

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS

PERFORMANCE TESTING EVALUATION REPORT OF RESULTS COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

Content Based Image Retrieval Using Color Histogram

Content Based Image Retrieval Using Color Histogram Content Based Image Retrieval Using Color Histogram Nitin Jain Assistant Professor, Lokmanya Tilak College of Engineering, Navi Mumbai, India. Dr. S. S. Salankar Professor, G.H. Raisoni College of Engineering,

More information

Adjusting for linkage errors to analyse coverage of the Integrated Data Infrastructure (IDI) and the administrative population (IDI-ERP)

Adjusting for linkage errors to analyse coverage of the Integrated Data Infrastructure (IDI) and the administrative population (IDI-ERP) Adjusting for linkage errors to analyse coverage of the Integrated Data Infrastructure (IDI) and the administrative population (IDI-ERP) Hochang Choi, Statistical Analyst, Stats NZ Paper prepared for the

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

Online handwritten signature verification system: A Review

Online handwritten signature verification system: A Review Online handwritten signature verification system: A Review Abstract: Online handwritten signature verification system is one of the most reliable, fast and cost effective tool for user authentication.

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Automatic hardness testing devices

Automatic hardness testing devices Automatic hardness testing devices The measure of hardness, applied to rubber and plastic, is a measure of stiffness obtained from an indentation test. An indentor is pressed into the sample under a given

More information

Lessons learned from a mixed-mode census for the future of social statistics

Lessons learned from a mixed-mode census for the future of social statistics Lessons learned from a mixed-mode census for the future of social statistics Dr. Sabine BECHTOLD Head of Department Population, Finance and Taxes, Federal Statistical Office Germany Abstract. This paper

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram

Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Shape Representation Robust to the Sketching Order Using Distance Map and Direction Histogram Kiwon Yun, Junyeong Yang, and Hyeran Byun Dept. of Computer Science, Yonsei University, Seoul, Korea, 120-749

More information

Biometrics for Public Sector Applications

Biometrics for Public Sector Applications Technical Guideline TR-03121-3 Biometrics for Public Sector Applications Part 3: Application Profiles and Function Modules Volume 2: Enrolment Scenarios for Identity Documents Version 4.2 P.O. Box 20 03

More information

Italian Americans by the Numbers: Definitions, Methods & Raw Data

Italian Americans by the Numbers: Definitions, Methods & Raw Data Tom Verso (January 07, 2010) The US Census Bureau collects scientific survey data on Italian Americans and other ethnic groups. This article is the eighth in the i-italy series Italian Americans by the

More information

The Center for Identification Technology Research (CITeR)

The Center for Identification Technology Research (CITeR) The Center for Identification Technology Research () Presented by Dr. Stephanie Schuckers February 24, 2011 Status Report is an NSF Industry/University Cooperative Research Center (IUCRC) The importance

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Performance Analysis of Multimodal Biometric System Authentication

Performance Analysis of Multimodal Biometric System Authentication 290 Performance Analysis of Multimodal Biometric System Authentication George Chellin Chandran. J 1 Dr. Rajesh. R.S 2 Research Scholar Associate Professor Dr. M.G.R. Educational and Research Institute

More information

Authentication Using Pulse-Response Biometrics

Authentication Using Pulse-Response Biometrics Authentication Using Pulse-Response Biometrics Kasper B. Rasmussen 1 Marc Roeschlin 2 Ivan Martinovic 1 Gene Tsudik 3 1 University of Oxford 2 ETH Zurich 3 UC Irvine Clermont Ferrand, 2014 Slide 1. A Bit

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

Image Averaging for Improved Iris Recognition

Image Averaging for Improved Iris Recognition Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video

More information

Standard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses

Standard Fingerprint Databases Manual Minutiae Labeling and Matcher Performance Analyses Standard Fingerprint Databases Manual Mehmet Kayaoglu, Berkay Topcu, Umut Uludag TUBITAK BILGEM, Informatics and Information Security Research Center, Turkey {mehmet.kayaoglu, berkay.topcu, umut.uludag}@tubitak.gov.tr

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique

A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique A Proficient Matching For Iris Segmentation and Recognition Using Filtering Technique Ms. Priti V. Dable 1, Prof. P.R. Lakhe 2, Mr. S.S. Kemekar 3 Ms. Priti V. Dable 1 (PG Scholar) Comm (Electronics) S.D.C.E.

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

More Info at Open Access Database by S. Dutta and T. Schmidt

More Info at Open Access Database  by S. Dutta and T. Schmidt More Info at Open Access Database www.ndt.net/?id=17657 New concept for higher Robot position accuracy during thermography measurement to be implemented with the existing prototype automated thermography

More information

Direct Attacks Using Fake Images in Iris Verification

Direct Attacks Using Fake Images in Iris Verification Direct Attacks Using Fake Images in Iris Verification Virginia Ruiz-Albacete, Pedro Tome-Gonzalez, Fernando Alonso-Fernandez, Javier Galbally, Julian Fierrez, and Javier Ortega-Garcia Biometric Recognition

More information