The 123 of Biometric Technology

Size: px
Start display at page:

Download "The 123 of Biometric Technology"

Transcription

1 We are so used to recognising people in our daily life that we often take this task for granted. Despite the often heard problems of fraud in the electronic transactions over the Internet in which lack of identity authentication is a prime cause, automated identity authentication afforded by biometric technology is not looked into seriously by most corporations. owever, after the September 11 incident, biometric technology is gaining in popularity. This article will give an overview of this technology, its potential, issues and challenges to widespread adoption. Yau Wei Yun Research anager, aboratories for Information Technology Co-Chair, Biometrics Working Group of Security & Privacy Standards Technical Committee 1. Introduction Section Three Even in the current Information Technology (IT) age, identity authentication is very crucial. IT brings with it capability for electronic transaction where face-to-face or other means of personal contact is not necessary. The lack of actual contact makes identifying the real user necessary as well as difficult. Necessary because as the saying goes, in the Internet, even a monkey can be human! Difficult as it goes beyond the traditional means of identity authentication and where being anonymous and staying anonymous is the desired feature of the Internet. 83 One of the remarkable ability of human and most animals is to identify friends from foes. Such capability is crucial for survival from ancient time till now. Why is it so? Wrongly identifying a foe as a friend could mean goodwill abused, property or wealth stolen, valuable information lost to unwanted hands, life of oneself and family members jeopardised or in larger scale, the society or nation threatened. The reverse will equally cost one dearly in societal and personal relationship. If you think about it, our capability to recognise people has been developed since young and is used daily - we recognise our family members, friends and foes, primarily through face and voice. Our daily transactions, from purchasing things at the nearby convenience stores, withdrawing small amount of money at the Auto-Teller achines, entering our house or office to large monetary transactions at a bank involves our identity and the means of authenticating it. Indeed, it is pervasive in our daily life.

2 Traditional means of identity authentication using tokens such as keys and cards, or personal identification numbers (PINs) and passwords are ill suited for such a task. For example, if you would like to purchase anything in the Internet, most likely you will require a credit card number to authenticate who you are and that you have means to pay for your goods. owever, such a number can be obtained rather easily by hackers, not to mention the numerous fake credit cards in circulation. Bank cards need PINs to authenticate one's identity. owever, in many situations, the PINs can be obtained easily either because the users wrote the PINs behind their cards or at some place or that the PINs were obtained through observation or fraudulent means. Some users have more than one bank account and thus it is challenging to remember all the PINs on top of the various PINs/passwords used daily. The most important issue is how to identify the "real" person without resorting to any complex and troublesome mechanism for verification. Biometrics is seen as one of the best candidates to solve this problem. Essentially, biometrics is the automated approach to authenticate the identity of a person using the individual's unique physiological or behavioural characteristics such as fingerprint, face, voice, signature etc. Since it is based on a unique trait which is part of you, you do not have to worry about forgetting it, losing it or leaving it at some place. Since it is unique to you, it is more difficult for others to copy, duplicate or steal it. Thus in general, biometrics offers a more secure and friendly way of identity authentication. 2. Biometrics There are several biometric technologies in use today with a few more technologies being investigated in research laboratories worldwide [1, 2]. Nevertheless, all the technologies share a common process flow as follows: Figure 1: Common Biometric Process Flow 84 Processing: Extract Features and Generate Template

3 A sensor is required to acquire the biometric data that will then be processed by a processor which could be part of an embedded system or a PC. The processing involves enhancing the data, removing noise and segmenting out the crucial data. From such conditioned data, the unique features are then extracted and a template is then generated to represent the biometric data. This template will be the basis from which the uniqueness of the data is associated with the identity of the user. If it is the first time the user is using the biometric system, the template will be stored for future references. Other information associated with the user may be included as well. User access to the system involves comparing the generated template against the reference of allowed user(s). If the matching is made against a claimed identity, the matching process will be a one to one comparison between the generated template and the stored reference template. Such a matching process is called a verification process. There are many ways to claim an identity, such as by entering name, telephone number, PIN or password and using token such as smart card or contactless card. Another possible mode of matching is to compare the generated template against a list of reference templates of legitimate users. Such a process involves one to many comparisons and the matching process is called an identification process. The type of matching process used in a biometric system will depend on the nature of application where the biometric system is used and the biometric technology involved, as not all biometric technology is suitable for identification. The following sections will discuss the common biometric technology such as face, fingerprint, hand geometry, iris, and voice. 3. Face Section Three Feature-based approach rely on the identification of certain fiducial points on the face which are less susceptible to alteration, including the points at the eyes, the side of the nose and the mouth, the points surrounding one's cheekbones etc. The locations of these points are used to compute the geometrical relationships between the points. The regions surrounding the points can be analysed locally as well. Results from all the local processing at the fiducial points are then combined to obtain the overall face recognition. Since detection of feature points precedes the analysis, such a system is robust to position variations in the image. owever, automatic detection of the fiducial points is not accurate and consistent enough to yield a high accuracy rate for the face recognition. 85 A face image can be acquired using a normal camera such as an off-the-shelf desktop camera. As such, it is the most natural biometric for identity authentication. Two main approaches are used to perform face recognition, namely holistic or global approach and feature-based approach [3].

4 olistic approach processes the entire face image simultaneously without attempting to localise the individual points. This approach has some variants in the type of technology used, such as statistical analysis, neural networks or transformations. The famous examples for statistical analysis are the eigenface technique [5] and local feature analysis [6] while for neural network is the elastic bunch graph matching technique [7]. The advantage of holistic approach is that it utilizes the face as a whole and does not destroy any information by exclusively processing only certain fiducial points. This generally yields more accurate recognition results. owever, such technique is sensitive to variations in position and scale, and thus requires large training data sets [3, 4]. Figure 2A: Sample Eigenfaces [8] Figure 2B: Elastic Bunch Graph [9] Face recognition is generally accepted by the public, easy to use, a covert process, compact and the cost is rather low. The disadvantage is that the accuracy achievable it is only suitable for verification, but is still insufficient for identification. The performance will also be affected by variation in face due to aging, make-up, hair-style, glasses, pose and lighting condition in addition to not being able to separate twins. 4. Fingerprint 86 Fingerprint is the oldest method of identity authentication and has been used since 1896 for criminal identification. The fingertips have corrugated skin with line like ridges flowing from one side of the finger to another. The flow of the ridges is non-continuous and forms a pattern. The discontinuity in the ridge flow give rise to feature points, called minutiae, while the pattern of flow give rise to classification pattern such as arches, whorls and loops. These are the basis of fingerprint recognition.

5 Figure 3: A Sample Fingerprint Image Section Three There are two main technical approaches for fingerprint recognition: minutia matching and pattern matching. The former approach locates all the minutiae in the fingerprint consisting mainly ridge ending (where the ridge ends) and bifurcation (where the ridge branches into two). Other possible minutiae include dot (very short ridge), island (two nearby bifurcations), crossover (two ridges crossing each other) and pore. From the geometric information, type, direction and relationship of the minutiae, comparisons can be made in order to establish whether the two minutia template matched or not. The latter approach utilizes the region surrounding a minutiae or other distinct mark and extrapolates data from the series of ridges in this region. For matching, the same area need to be found and compared and methods to handle deformation in the pattern is devised. Typically, the template size of the pattern matching approach is 2-3 times larger than in minutia approach [1]. It is almost impossible to recreate the fingerprint image from the minutia based template but this cannot be said for the pattern matching approach. In addition, all the AFIS system used in forensic applications is minutia based and is an accepted approach in a court of law. Thus majority of the fingerprint recognition system uses the minutia approach. 87 In forensic application, the fingerprints of criminal suspects are acquired (traditionally using the ink-and-roll procedure) and stored centrally. Identity search is then conducted using an Automated Fingerprint Identification System (AFIS) to narrow the search to one or a few prime suspects when a crime occurs. For civil applications, the fingerprint is not stored, but acquired live. The template which represents the fingerprint is stored rather than the image. There are a few variants of image capture technology available for such commercially oriented fingerprint sensor, including optical, silicon, ultrasound, thermal and hybrid.

6 In general, fingerprint recognition can achieve good accuracy sufficient for both verification and identification. It is low cost and compact and is getting popular as consumer products. owever, not everyone has fingerprints that can be recognised. The sensor is also not able to capture acceptable quality fingerprint images for people with very wet and very dry skin. In addition, the sensor needs to be maintained properly in order to get consistent performance. The Spring 2002 international developer survey conducted by Evans Data recently has concluded that fingerprints have the most potential in terms of user authentication. 5. and Geometry The hand image is obtained using a camera looking from the top when the user placed his or her hand at a specified surface. The hand can be aligned using pegs or reference marks. Two views are usually taken in a single image, the top view and the side view. The side view is usually taken by the top camera as well using a side mirror. From the hand image, the fingers are located and the length, width, thickness, curvatures and their relative geometry measured. Figure 4: easurements of Typical and Geometry System [10] 88 The hand geometry template size can be very small. It has acceptable accuracy for verification but not sufficient for identification. The major advantage is that most people can use it and as such, the acceptance rate is good. owever, the system is rather bulky and may have problems with aging and health condition such as arthritis.

7 6. Iris Iris, the coloured part of the eye, is composed of a type of tissue called trabecular meshwork which gives the appearance of layered radial lines or mesh when the iris is examined closely. The visible mesh consists of characteristics such as striations, rings, crypts, furrows etc. giving the iris a unique pattern. The iris pattern is stable throughout the lifespan and is different for twins as well since the pattern is independent of genetic makeup. The iris image is usually acquired using a monochrome camera with visible and near infra red light ( nm) [1]. In the processing stage, the eye is located and then the iris is segmented, leaving out the pupil and other noisy areas caused by reflection of light. Based on the efficient algorithm invented by Prof. John Daugman of Cambridge University, England, the iris is divided into rims [11]. For each rim, 2-D Gabor wavelets (a type of filter) are applied sequentially throughout the rim to extract the iris feature into numerical data, called the IrisCode(tm). The algorithm is able to reveal 266 independent degrees-of-freedom of textural variation, making it a very accurate biometric [12]. The IrisCode takes up 256 bytes of memory storage and can be efficiently matched by computing the fraction of mismatched bits relative to matched bits of two IrisCodes, called the amming distance [11]. Section Three Iris recognition is very accurate with very low false acceptance rate (wrongly identifying the impostor as the genuine user) and can be applied to both verification and identification. The identification speed is also very fast and it is relatively easy to verify whether the iris is from a living subject. owever, the cost of the system is somewhat high and not compact. It also suffers from poor lighting, reflection and possibly glasses and may not be suitable for people with cataract and young children. In addition, some imaging system will require the user to be motionless for a while. 89 Figure 5: A Sample Segmented Iris with IrisCode at Top eft Corner [11]

8 7. Voice Voice authentication or speaker recognition uses a microphone to record the voice of a person. The recorded voice is digitised and then used for authentication. The speech can be acquired from the user enunciating a known text (text dependent) or speaking (text independent). In the former case, the text can be fixed or prompted by the system. The text can also be read discretely or the entire text read out continuously. The captured speech is then enhanced and unique features extracted to form a voice template. There are two types of templates: stochastic templates and model templates. Stochastic templates require probabilistic matching techniques such as the popular idden arkov odel and results in a measure of likelihood of the observation given the template. For model templates, the matching techniques used are deterministic. The observation is assumed to be similar to the model, albeit some distortion. atching result is obtained by measuring the minimum error distance when the observation is aligned to the model. The matching techniques popularly used for model templates include Dynamic Time Warping algorithm, Vector Quantisation and Nearest Neighbours algorithm [13]. As voice is a common means of communication, and with an extensive telephone network, a microphone becomes rather common and as such the cost of voice authentication can be very low and compact. Furthermore, it is relatively easy to use. owever, voice varies with age and there can be drastic change from childhood to adolescence. Also illness and emotion may affect the voice as well as room acoustics and environmental noise. Variation in microphones and channel mismatch (use of different type and quality of microphones) is also a major problem for the widespread use of this biometric technology. 8. Other Biometric Technologies 90 There are other biometric technologies including signature, retinal scan, DNA typing, vein pattern (such as within the wrist, palm or dorsal surfaces of the hand), thermal pattern of the face (facial thermogram), keystroke dynamics, gait pattern, body odour and ear shape. Instead of relying on only one technology, a multi-modal system which combines several biometric technologies to increase the likelihood of finding a match will be increasingly feasible as hardware and system cost decreases to an attractive level.

9 Table I below shows a comparison amongst the various biometric technologies discussed. Table I: Comparison of Biometric Technologies [14] Biometrics Univer- Uniquesality ness Face Fingerprint and Geometry Keystroke Dynamics and vein Iris Retina Signature Voice Facial Thermogram DNA =igh, =edium, =ow Permanence Collectability Performance Accept- Circumability vention 1.False Acceptance Rate (FAR) This is also known as Type I error. It measures the percentage of impostors being incorrectly accepted as genuine user. Since almost all biometric systems aim to achieve correct identity authentication, this number should be as low as possible. Section Three In the PIN or password based system, the matching between the input data against the stored data is straight forward and the outcome is either "yes" or "no". If the result is not a match, you will usually blame yourself for providing the wrong input. owever, for a biometric system, the extracted data is never an exact replica of the stored biometric data due to the many variability factors involved. Thus, the matching algorithm is more complex, and the outcome of the comparison is usually a degree of confidence that the input biometric data is from the same person as the registered data. There is a tolerance involved. owever, the user will usually blame the system if he or she is rejected but at the same time, high level of security is needed to avoid wrongly accepting an impostor. In order to compare the performance of biometric technologies, there are several key measures that need to be understood: 91 In the above table, universality indicates how common the biometric is found in each person; uniqueness indicates how well the biometric separates one person from the other; permanence indicates how well the biometric resist the effect of aging; while collectability measures how easy it is to acquire the biometric for processing. Performance indicates the achievable accuracy, speed and robustness of the biometrics while acceptability indicates the degree of acceptance of the technology by the public in their daily life and circumvention indicates the level of difficulty to circumvent or fool the system into accepting an impostor.

10 2.False Rejection Rate (FRR) Also known as Type II error, this measures the percentage of genuine users being incorrectly rejected. In order to minimise inconveniences (or embarrassment) to the genuine user, this number should also be low. Nevertheless, in general, this error is more acceptable as usually the user can make a second attempt. 3.Equal Error Rate (EER) FAR and FRR are related. A stringent requirement for FAR (as low as possible) will inadvertently increase the FRR. The point where the FAR is equal to FRR is given by this measure. The smaller the EER, the better is the system as it indicates a good balance in the sensitivity of the system. The above measures can be found in almost all biometric product brochures. owever, these values typically apply to specific (usually controlled laboratory) settings and these measures are dependent on the quality of the database used. The dependency on the database needs to be highlighted as the degree of imperfection in the biometric data of the database used will greatly influence the achievable rate for these measures. Such degree of imperfection or distortion will usually arise in the actual use of the system and is also dependent on how familiar the users are to the system. As such, these measures are meant more as a guide than as an absolute metrics for comparison. If these measures are to be used for product comparison, then a "best practice" or standard is needed to validate these measures. Such standard is still lacking currently. In addition, the actual achievable rate experienced by the user when the biometric system is used will depend on the scenario, environment and application context of the system. For example, installing a voice authentication system at the airport exposed to the loud aircraft noise will drastically reduce the performance of the voice authentication system. 9. Issues and Challenges 92 With the basics of biometric technology, we now consider the issues, potential and challenges faced by biometric technology. In selecting a specific biometric technology, the following should be considered: 1. Size of user group. 2. Place of use and the nature of use (such as needs for mobility). 3. Ease of use and user training required. 4. Error incidence such as due to age, environment and health condition. 5. Security and accuracy requirement needed.

11 6.User acceptance level, privacy and anonymity. 7.ong term stability including technology maturity, standard, interoperability and technical support. 8.Cost. Despite the long list above, one should not be disheartened by it. The Jan/Feb 2001 issue of IT Technology Review identified biometrics amongst the 10 emerging technologies that will change the world. Analysis by Frost & Sullivan, a strategic market consulting and training company in San Antonio, Texas, in "World Biometric Technologies arkets" indicates the total biometrics market generated $66 million in 2000 and is expected to reach $900 million by 2006 [15]. Just recently (14 June 2002), a report from the Cutter Consortium reveals that the use of biometric-based technology is increasing. According to the report, a survey of business technology professionals revealed that biometric systems have been implemented by six percent of the companies interviewed. In addition, according to the Biometric arket Report 2003, Biometric revenues are expected to grow from $399m in 2000 to $1.9b by 2005 and that revenues attributable to large-scale public sector biometric usage, currently 70% of the biometric market will drop to under 30% by Furthermore, finger-scan and biometric middleware will emerge as two critical technologies for the desktop, together comprising approximately 40% of the biometric market by 2005 [16]. Section Three 93 Figure 6: Total Biometric Revenues from 1999 to 2005 (US$m) [16]

12 Other motivating factors for biometrics include the report by Asian Wall Street Journal in 2001 indicating that online transaction is only 5% of the total credit card transactions but makes up 50% of all credit card fraud, the fear by consumers that shopping online will allow their credit card data to be seized by hackers and the terrorist attack on the World Trade Center in the United States. All these increase the awareness and demand for biometrics as a better and more secure means of identity authentication. Coupled to that, the cost of biometric solutions is decreasing. There are numerous applications for biometric systems. ost applications currently concentrate on security related physical and logical access control. These include the following areas: 1. Banking/Financial services such as ATs, payment terminals, cashless payment, automated cheque cashing etc. 2. Computer & IT Security such as Internet transactions, PC login etc. 3. ealthcare such as privacy concern, patient information control, drug control etc. 4. Immigration such as border control, frequent travelers, asylum seekers etc. 5. aw and Order such as public ID card, voting, gun control, prison, parole etc. 6. Gatekeeper/Door Access Control such as secure installations, military, hotel, building management etc. 7. Telecommunication such as telephony, mobile phone, subscription fraud, call center, games etc. 8. Time and Attendance such as school and company attendance, 9. Welfare, including health care services and benefit payments Consumer Products such as automated service machines, vault, lock-set, PDA etc. Another major area which has received little attention is the opportunity for personalisation services. For example, a TV remote control with biometric capability can automatically select the channel of interest of the user together with the preferred volume and brightness settings. Similarly, a mobile phone with biometric capability is able to customise the user interface, ring tone, phone diary, speed dial etc. Imagine entering a members-only golf club reception with the automated system calling your name - it will surely impress you and your guests!

13 There are major challenges to the wide roll-out and adoption of biometric systems, such as lack of user education, especially since there are several biometric technologies to choose but not every technology is suitable for all application scenarios and the impact to privacy on the use of such technology. Over expectation, either due to ignorance of the users or exaggerated by the over-zealous sellers in the capability of biometric will also slow the market adoption as the system will not perform as "expected" in the eye of the users, causing lack of trust in the technology. ack of interoperability and standard is also a challenge preventing wide-scale adoption since users especially corporations will not want to invest in a technology that will soon obsolete or lack technical support. In this area, several international standardisation efforts have been pursued, including the BioAPI for biometrics application programming interface, CBEFF for common biometric data exchange format and very recently, the formation of groups at ISO/IEC to look into biometric standardisation. Some of the biometric technology is also less mature and will need more time for research and trial testing before its performance can be enhanced to suit the market requirements. 10.Conclusion Biometric is an emerging area with many opportunities for growth. The technology will continue to improve and challenges such as interoperability solved through standardisation. This will lead to increase in the market adoption rate and the technology will proliferate. Possibly in the near future, you will not have to remember PINs and passwords and keys in your bags or pockets will be things of the past. 11.References [1] International Biometric Group website, [5]. Turk and A. Pentland, "Eigenfaces for Recognition", Journal of Cognitive Neuroscience, Vol. 3, pp , [6] Visionics website, [7]. Wiskott, J.. Fellous and C. von der alsburg, "Face Recognition by Elastic Bunch Graph atching", IEEE Trans. on Pattern Analysis and achine Intelligence, Vol. 19, pp , [4] IT edia ab Website, Section Three [3] R. Chellappa et al., "uman and achine Recognition of Faces: A Survey", Technical Report CAR-TR-731, University of aryland Computer Vision aboratory, [2] ISO/IEC JTC1/SC17 N1793, "Usability of Biometrics in Relation to Electronic Signatures v1.0."

14 [8] Eigenfaces Demo website, IT: [9] Face Recognition by Elastic Bunch Graph atching website, Bochum University: Recognition/contents.html. [10] Biometric Systems ab website, Bologna University: [11] John Daugman's website, [12]. Negin et al., "An Iris Biometric System for Public and Personal Use", Computer, Vol. 33, No. 2, pp , [13] J.P. Campbell Jr., "Speaker Recognition: A Tutorial", Proceedings of The IEEE, Vol. 85, No. 9, pp , [14] A Jain, R. Bolle, S. Pankanti, "Biometrics: Personal Identification in Networked Society", Kluwer, [15] CNN Tech News, July 20, [16] International Biometric Group "Biometric arket Report 2003" website: 96

Introduction to Biometrics 1

Introduction to Biometrics 1 Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living

More information

BIOMETRICS BY- VARTIKA PAUL 4IT55

BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics

More information

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics

Biometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used

More information

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique

ISO/IEC TR TECHNICAL REPORT. Information technology Biometrics tutorial. Technologies de l'information Tutoriel biométrique TECHNICAL REPORT ISO/IEC TR 24741 First edition 2007-09-15 Information technology Biometrics tutorial Technologies de l'information Tutoriel biométrique Reference number ISO/IEC 2007 Contents Page Foreword...

More information

The Role of Biometrics in Virtual Communities. and Digital Governments

The Role of Biometrics in Virtual Communities. and Digital Governments The Role of Biometrics in Virtual Communities and Digital Governments Chang-Tsun Li Department of Computer Science University of Warwick Coventry CV4 7AL UK Tel: +44 24 7657 3794 Fax: +44 24 7657 3024

More information

User Awareness of Biometrics

User Awareness of Biometrics Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org

More information

Biometric Recognition: How Do I Know Who You Are?

Biometric Recognition: How Do I Know Who You Are? Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu

More information

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)

INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION

More information

Biometrics - A Tool in Fraud Prevention

Biometrics - A Tool in Fraud Prevention Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts

More information

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY

BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY BIOMETRICS: AN INTRODUCTION TO NEW MODE OF SECURITY Manoj Parmar 1, Ritesh Patankar 2 1 IT Department, G.P.Himatnagar 2 EC Department, G.P.Gandhinagar Abstract The term "biometrics" is derived from the

More information

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach

Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor

More information

A Proposal for Security Oversight at Automated Teller Machine System

A Proposal for Security Oversight at Automated Teller Machine System International Journal of Engineering Research and Development e-issn: 2278-067X, p-issn: 2278-800X, www.ijerd.com Volume 10, Issue 6 (June 2014), PP.18-25 A Proposal for Security Oversight at Automated

More information

Biometrics and Fingerprint Authentication Technical White Paper

Biometrics and Fingerprint Authentication Technical White Paper Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical

More information

Feature Extraction Techniques for Dorsal Hand Vein Pattern

Feature Extraction Techniques for Dorsal Hand Vein Pattern Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,

More information

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security

Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Second Symposium & Workshop on ICAO-Standard MRTDs, Biometrics and Security Face Biometric Capture & Applications Terry Hartmann Director and Global Solution Lead Secure Identification & Biometrics UNISYS

More information

Modern Biometric Technologies: Technical Issues and Research Opportunities

Modern Biometric Technologies: Technical Issues and Research Opportunities Modern Biometric Technologies: Technical Issues and Research Opportunities Mandeep Singh Walia (Electronics and Communication Engg, Panjab University SSG Regional Centre, India) Abstract : A biometric

More information

About user acceptance in hand, face and signature biometric systems

About user acceptance in hand, face and signature biometric systems About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación

More information

Title Goes Here Algorithms for Biometric Authentication

Title Goes Here Algorithms for Biometric Authentication Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing

More information

Touchless Fingerprint Recognization System

Touchless Fingerprint Recognization System e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph

More information

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University

An Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical

More information

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression

An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication

More information

Biometric Recognition Techniques

Biometric Recognition Techniques Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,

More information

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor

On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International

More information

BIOMETRIC IDENTIFICATION

BIOMETRIC IDENTIFICATION BIOMETRIC IDENTIFICATION When it comes to working biometric identification technologies, it s not only our fingerprints that do the talking. Now, our eyes, hands, signature, speech, and even facial temperature

More information

Study and Analysis on Biometrics and Face Recognition Methods

Study and Analysis on Biometrics and Face Recognition Methods 37 Study and Analysis on Biometrics and Face Recognition Methods Anjani Kumar Singha Department of Computer Science and Engineering Gurukula Kangri Vishwavidyalaya, Haridwar, Uttarakhand Anshu Singla Department

More information

Shannon Information theory, coding and biometrics. Han Vinck June 2013

Shannon Information theory, coding and biometrics. Han Vinck June 2013 Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:

More information

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN

International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January ISSN International Journal of Scientific & Engineering Research, Volume 5, Issue 1, January-2014 289 Fingerprint Minutiae Extraction and Orientation Detection using ROI (Region of interest) for fingerprint

More information

Authenticated Document Management System

Authenticated Document Management System Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College

More information

1. First printing, TR , March, 2000.

1. First printing, TR , March, 2000. MERL { A MITSUBISHI ELECTRIC RESEARCH LABORATORY http://www.merl.com Book Review: Biometrics William T. Freeman MERL, Mitsubishi Electric Research Labs. 201 Broadway Cambridge, MA 02139 TR-2000-07 March

More information

Iris Segmentation & Recognition in Unconstrained Environment

Iris Segmentation & Recognition in Unconstrained Environment www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT

More information

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER

International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,

More information

ISSN Vol.02,Issue.17, November-2013, Pages:

ISSN Vol.02,Issue.17, November-2013, Pages: www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.

More information

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA

RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA Bulletin of the Transilvania University of Braşov Series VII: Social Sciences Law Vol. 7 (56) No. 1-2014 RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA I. ARON 1 A. CTIN. MANEA

More information

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology

IRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area

More information

Little Fingers. Big Challenges.

Little Fingers. Big Challenges. Little Fingers. Big Challenges. How Image Quality and Sensor Technology Are Key for Fast, Accurate Mobile Fingerprint Recognition for Children The Challenge of Children s Identity While automated fingerprint

More information

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK)

Tools for Iris Recognition Engines. Martin George CEO Smart Sensors Limited (UK) Tools for Iris Recognition Engines Martin George CEO Smart Sensors Limited (UK) About Smart Sensors Limited Owns and develops Intellectual Property for image recognition, identification and analytics applications

More information

Investigation of Recognition Methods in Biometrics

Investigation of Recognition Methods in Biometrics Investigation of Recognition Methods in Biometrics Udhayakumar.M 1, Sidharth.S.G 2, Deepak.S 3, Arunkumar.M 4 1, 2, 3 PG Scholars, Dept of ECE, Bannari Amman Inst of Technology, Sathyamangalam, Erode Asst.

More information

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA

ABSTRACT INTRODUCTION. Technical University, LATVIA 2 Head of the Division of Software Engineering, Riga Technical University, LATVIA ISSN: 0976-3104 SUPPLEMENT ISSUE ARTICLE TOWARDS UTILIZATION OF A LEAN CANVAS IN THE BIOMETRIC SOFTWARE TESTING Padmaraj Nidagundi 1, Leonids Novickis 2 1 Faculty of Computer Science and Information Technology,

More information

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION

EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION EFFICIENT ATTENDANCE MANAGEMENT SYSTEM USING FACE DETECTION AND RECOGNITION 1 Arun.A.V, 2 Bhatath.S, 3 Chethan.N, 4 Manmohan.C.M, 5 Hamsaveni M 1,2,3,4,5 Department of Computer Science and Engineering,

More information

Iris Recognition-based Security System with Canny Filter

Iris Recognition-based Security System with Canny Filter Canny Filter Dr. Computer Engineering Department, University of Technology, Baghdad-Iraq E-mail: hjhh2007@yahoo.com Received: 8/9/2014 Accepted: 21/1/2015 Abstract Image identification plays a great role

More information

Biometric Authentication for secure e-transactions: Research Opportunities and Trends

Biometric Authentication for secure e-transactions: Research Opportunities and Trends Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa

More information

A New Fake Iris Detection Method

A New Fake Iris Detection Method A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn

More information

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire)

Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Unit 5- Fingerprints and Other Prints (palm, lip, shoe, tire) Historical Perspective: Quest for reliable method of personal identification: Tattooing Numbers Branding Cutting off Fingers Holocaust Survivor

More information

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS

OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS 1 OUTLINES: ABSTRACT INTRODUCTION PALM VEIN AUTHENTICATION IMPLEMENTATION OF CONTACTLESS PALM VEIN AUTHENTICATIONSAPPLICATIONS RESULTS OF PRACTICAL EXPERIMENTS CONCLUSION 2 ABSTRACT IDENTITY VERIFICATION

More information

Biometrics is the science of recognizing a person on

Biometrics is the science of recognizing a person on Applications Editor: Michael J. Potel http://www.wildcrest.com Graphics and Security: Exploring Visual Biometrics Kirk L. Kroeker 1 Visionics FaceIt facerecognition biometric system creating a face template.

More information

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室.

Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室. -2009 2009-12-1515 Face Recognition (Wen-Shiung Chen, Ph.D.) Visual Information Processing & CyberCommunications Lab. (VIP-CCL) 視覺資訊處理暨信息通訊實驗室 wschen@ncnu.edu.tw 1 OUTLINE Introduction Biometric Recognition

More information

Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998.

Notes from a seminar on Tackling Public Sector Fraud presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Tackling Public Sector Fraud Notes from a seminar on "Tackling Public Sector Fraud" presented jointly by the UK NAO and H M Treasury in London, England in February 1998. Glenis Bevan audit Manager, Audit

More information

Fingerprint Analysis. Bud & Patti Bertino

Fingerprint Analysis. Bud & Patti Bertino Fingerprint Analysis Bud & Patti Bertino Fingerprints Formation Skin produce secretions oil, salts Dirt combines with secretions Secretions stick to unique ridge patterns on skin Did You Know? Fingerprints

More information

Non-Contact Vein Recognition Biometrics

Non-Contact Vein Recognition Biometrics Non-Contact Vein Recognition Biometrics www.nearinfraredimaging.com 508-384-3800 info@nearinfraredimaging.com NII s technology is multiple modality non-contact vein-recognition biometrics, the visualization

More information

Improved Human Identification using Finger Vein Images

Improved Human Identification using Finger Vein Images Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 1, January 2014,

More information

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos

FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,

More information

IRIS RECOGNITION USING GABOR

IRIS RECOGNITION USING GABOR IRIS RECOGNITION USING GABOR Shirke Swati D.. Prof.Gupta Deepak ME-COMPUTER-I Assistant Prof. ME COMPUTER CAYMT s Siddhant COE, CAYMT s Siddhant COE Sudumbare,Pune Sudumbare,Pune Abstract The iris recognition

More information

A Novel Approach for Human Identification Finger Vein Images

A Novel Approach for Human Identification Finger Vein Images 39 A Novel Approach for Human Identification Finger Vein Images 1 Vandana Gajare 2 S. V. Patil 1,2 J.T. Mahajan College of Engineering Faizpur (Maharashtra) Abstract - Finger vein is a unique physiological

More information

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM

DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM DORSAL PALM VEIN PATTERN BASED RECOGNITION SYSTEM Tanya Shree 1, Ashwini Raykar 2, Pooja Jadhav 3 Dr. D.Y. Patil Institute of Engineering and Technology, Pimpri, Pune-411018 Department of Electronics and

More information

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno

User Authentication. Goals for Today. My goals with the blog. What You Have. Tadayoshi Kohno CSE 484 (Winter 2008) User Authentication Tadayoshi Kohno Thanks to Dan Boneh, Dieter Gollmann, John Manferdelli, John Mitchell, Vitaly Shmatikov, Bennet Yee, and many others for sample slides and materials...

More information

Biometrics in a Glimpse

Biometrics in a Glimpse Biometrics in a Glimpse Shireen Y. Elhabian and Aly A. Farag Computer Vision and Image Processing Laboratory Department of Electrical and Computer Engineering University of Louisville Louisville, Kentucky

More information

Evaluation of Biometric Systems. Christophe Rosenberger

Evaluation of Biometric Systems. Christophe Rosenberger Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC

More information

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT

UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT UNIVERSITY OF CENTRAL FLORIDA FRONTIERS IN INFORMATION TECHNOLOGY COP 4910 CLASS FINAL REPORT Abstract This report brings together the final papers presented by the students in the Frontiers in Information

More information

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh

Biometrics in Law Enforcement and Corrections. Presenters: Orlando Martinez & Lt. Pat McCosh Biometrics in Law Enforcement and Corrections Presenters: Orlando Martinez & Lt. Pat McCosh Presentation Overview Introduction Orlando Martinez VP Global Sales, L1 Identity Solutions Biometrics Division

More information

Student Attendance Monitoring System Via Face Detection and Recognition System

Student Attendance Monitoring System Via Face Detection and Recognition System IJSTE - International Journal of Science Technology & Engineering Volume 2 Issue 11 May 2016 ISSN (online): 2349-784X Student Attendance Monitoring System Via Face Detection and Recognition System Pinal

More information

Impact of Resolution and Blur on Iris Identification

Impact of Resolution and Blur on Iris Identification 100 101 102 103 104 105 106 107 108 109 110 111 112 113 114 115 116 117 118 119 120 121 122 123 124 125 126 127 128 129 130 131 132 133 134 135 136 137 138 139 140 141 142 143 144 145 146 147 148 149 Abstract

More information

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC.

MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. MINUTIAE MANIPULATION FOR BIOMETRIC ATTACKS Simulating the Effects of Scarring and Skin Grafting April 2014 novetta.com Copyright 2015, Novetta, LLC. Minutiae Manipulation for Biometric Attacks 1 INTRODUCTION

More information

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image.

Abstract Terminologies. Ridges: Ridges are the lines that show a pattern on a fingerprint image. An Approach To Extract Minutiae Points From Enhanced Fingerprint Image Annu Saini Apaji Institute of Mathematics & Applied Computer Technology Department of computer Science and Electronics, Banasthali

More information

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION

ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,

More information

Authentication using Iris

Authentication using Iris Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College

More information

Research on Friction Ridge Pattern Analysis

Research on Friction Ridge Pattern Analysis Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute

More information

Biometrical verification based on infrared heat vein patterns

Biometrical verification based on infrared heat vein patterns Proceedings of the 3rd IIAE International Conference on Intelligent Systems and Image Processing 2015 Biometrical verification based on infrared heat vein patterns Elnaz Mazandarani a, Kaori Yoshida b,

More information

Leading the Agenda. Everyday technology: A focus group with children, young people and their carers

Leading the Agenda. Everyday technology: A focus group with children, young people and their carers Leading the Agenda Everyday technology: A focus group with children, young people and their carers March 2018 1 1.0 Introduction Assistive technology is an umbrella term that includes assistive, adaptive,

More information

Effective and Efficient Fingerprint Image Postprocessing

Effective and Efficient Fingerprint Image Postprocessing Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg

More information

Objectives. You will understand: Fingerprints Fingerprints

Objectives. You will understand: Fingerprints Fingerprints Fingerprints Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal identification easier.

More information

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy

Finger print Recognization. By M R Rahul Raj K Muralidhar A Papi Reddy Finger print Recognization By M R Rahul Raj K Muralidhar A Papi Reddy Introduction Finger print recognization system is under biometric application used to increase the user security. Generally the biometric

More information

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY

ABSTRACT I. INTRODUCTION II. LITERATURE SURVEY International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 3 ISSN : 2456-3307 IRIS Biometric Recognition for Person Identification

More information

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies

Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Assessing the Impact of Concern for Privacy and Innovation Characteristics in the Adoption of Biometric Technologies Aakash Taneja University of Texas at Arlington Department of Information Systems & Operations

More information

Authenticated Automated Teller Machine Using Raspberry Pi

Authenticated Automated Teller Machine Using Raspberry Pi Authenticated Automated Teller Machine Using Raspberry Pi 1 P. Jegadeeshwari, 2 K.M. Haripriya, 3 P. Kalpana, 4 K. Santhini Department of Electronics and Communication, C K college of Engineering and Technology.

More information

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL

COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL COMBINING FINGERPRINTS FOR SECURITY PURPOSE: ENROLLMENT PROCESS MISS.RATHOD LEENA ANIL Department of Electronics and Telecommunication, V.V.P. Institute of Engg & Technology,Solapur University Solapur,

More information

3D Face Recognition System in Time Critical Security Applications

3D Face Recognition System in Time Critical Security Applications Middle-East Journal of Scientific Research 25 (7): 1619-1623, 2017 ISSN 1990-9233 IDOSI Publications, 2017 DOI: 10.5829/idosi.mejsr.2017.1619.1623 3D Face Recognition System in Time Critical Security Applications

More information

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems

On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge

More information

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1

Published by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1 IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha

More information

INVESTOR PRESENTATION SECURITY BIOMETRIC TECHNOLOGY NOVEMBER 2014

INVESTOR PRESENTATION SECURITY BIOMETRIC TECHNOLOGY NOVEMBER 2014 INVESTOR PRESENTATION SECURITY BIOMETRIC TECHNOLOGY NOVEMBER 2014 DISCLAIMER Some of the information contained in this presentation contains forward looking statements which may not directly or exclusively

More information

Laser Surface Authentication TM : biometrics for documents and goods

Laser Surface Authentication TM : biometrics for documents and goods Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,

More information

Machine Vision for the Life Sciences

Machine Vision for the Life Sciences Machine Vision for the Life Sciences Presented by: Niels Wartenberg June 12, 2012 Track, Trace & Control Solutions Niels Wartenberg Microscan Sr. Applications Engineer, Clinical Senior Applications Engineer

More information

ISSUANCE AND CIVIL REGISTRATION

ISSUANCE AND CIVIL REGISTRATION IDENTITY VERIFICATION IN PASSPORT ISSUANCE AND CIVIL REGISTRATION THE IMPORTANCE OF CONTEXT AND CONTINUITY OF IDENTITY Ross Greenwood Identity Matters Consulting Australia PURPOSE To invite a claim to

More information

Iris Recognition using Histogram Analysis

Iris Recognition using Histogram Analysis Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition

More information

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017)

International Conference on Innovative Applications in Engineering and Information Technology(ICIAEIT-2017) Sparsity Inspired Selection and Recognition of Iris Images 1. Dr K R Badhiti, Assistant Professor, Dept. of Computer Science, Adikavi Nannaya University, Rajahmundry, A.P, India 2. Prof. T. Sudha, Dept.

More information

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners

Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Comparison of ridge- and intensity-based perspiration liveness detection methods in fingerprint scanners Bozhao Tan and Stephanie Schuckers Department of Electrical and Computer Engineering, Clarkson University,

More information

Iris Recognition using Hamming Distance and Fragile Bit Distance

Iris Recognition using Hamming Distance and Fragile Bit Distance IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik

More information

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System

LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System LabVIEW based Intelligent Frontal & Non- Frontal Face Recognition System Muralindran Mariappan, Manimehala Nadarajan, and Karthigayan Muthukaruppan Abstract Face identification and tracking has taken a

More information

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION

Nikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using

More information

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India

3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,

More information

Challenges and Potential Research Areas In Biometrics

Challenges and Potential Research Areas In Biometrics Challenges and Potential Research Areas In Biometrics Defence Research and Development Canada Qinghan Xiao and Karim Dahel Defence R&D Canada - Ottawa October 18, 2004 Recherche et développement pour la

More information

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES

A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES A COMPARATIVE STUDY OF VARIOUS BIOMETRIC APPROACHES Ramandeep Chahal Department of CSE GVIET, Banur, Punjab, India ABSTRACT Biometric is the science for recognizing an individual on the basis of his or

More information

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs

Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs Fingerprints - Formation - Fingerprints are a reproduction of friction skin ridges that are on the palm side of fingers and thumbs - these skin surfaces have been designed by nature to provide our bodies

More information

Fingerprint Recognition using Minutiae Extraction

Fingerprint Recognition using Minutiae Extraction Fingerprint Recognition using Minutiae Extraction Krishna Kumar 1, Basant Kumar 2, Dharmendra Kumar 3 and Rachna Shah 4 1 M.Tech (Student), Motilal Nehru NIT Allahabad, India, krishnanitald@gmail.com 2

More information

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India

Fingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra

More information

An Algorithm for Fingerprint Image Postprocessing

An Algorithm for Fingerprint Image Postprocessing An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most

More information

IRIS Recognition Using Cumulative Sum Based Change Analysis

IRIS Recognition Using Cumulative Sum Based Change Analysis IRIS Recognition Using Cumulative Sum Based Change Analysis L.Hari.Hara.Brahma Kuppam Engineering College, Chittoor. Dr. G.N.Kodanda Ramaiah Head of Department, Kuppam Engineering College, Chittoor. Dr.M.N.Giri

More information

Sensors. CSE 666 Lecture Slides SUNY at Buffalo

Sensors. CSE 666 Lecture Slides SUNY at Buffalo Sensors CSE 666 Lecture Slides SUNY at Buffalo Overview Optical Fingerprint Imaging Ultrasound Fingerprint Imaging Multispectral Fingerprint Imaging Palm Vein Sensors References Fingerprint Sensors Various

More information

Experiments with An Improved Iris Segmentation Algorithm

Experiments with An Improved Iris Segmentation Algorithm Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.

More information

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION

ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,

More information

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com

Fingerprints. Fingerprints. Dusan Po/Shutterstock.com Fingerprints Dusan Po/Shutterstock.com 1 Objectives You will understand: Why fingerprints are individual evidence. Why there may be no fingerprint evidence at a crime scene. How computers have made personal

More information