High volume security printing using sheet-fed offset press
|
|
- Shannon Robinson
- 6 years ago
- Views:
Transcription
1 High volume security printing using sheet-fed offset press Slavtcho (Slavi) Bonev Epyxs GmbH Richard-Wagner-Str 29, 6816 Mannheim, Germany Abstract: Security printing based on DataGrid and EpiCode is a novel, very efficient anti-counterfeiting technique based on the individuality of prints DataGrid is a high-density halftone data storage which forms a unique signature the so called EpiCode when it is printed The EpiCode is caused by the physical interaction between printing medium (ink) and substrate (paper) and is used as a fingerprint for authentication In sheet-fed offset printing the signature of the printing plate is a novel feature for anti-counterfeit applications In the presented printing tests, the influence of the substrate on the EpiCode and the long-term stability of the offset printing process regarding the plate signature are determined using biometrical analysis Equal error rates (EER) better than -4 are achieved in the case of four paper grades commonly used for labels and packaging Further, the printing plate signature has proven a stabile feature for a cluster of printed DataGrids and is therefore called ClusterCode Authentication based on ClusterCode achieved equal error rates (EER) better than - In addition, a recognition system using a reduced database is proposed Keywords: security printing, paper substrate, long-term stability, print quality control, biometrical system 1 Introduction Each EpiCode is uniquely linked to a printed DataGrid (Figure 1) This individual print signature (Bon, 28) comprises at least two independent components: (i) a stochastic component from the medium-substrate interaction eg microscopic ink smudging on the paper surface and (ii) a stochastic component from the irregularities of the printing plate It is expected that the surface roughness will have an impact on the first component - a) 1 2 Figure 1: Matrix code DataGrid (a) composed of 14x14 graphic symbols and its corresponding fingerprint signal EpiCode (b) of 196 samples with an amplitude resolution of 4 bits per sample The printing plate will have a systematic impact on the EpiCodes in a cluster A cluster is a batch of DataGrids on consecutive printed sheets which originates from the same master DataGrid on the printing plate So the second stochastic component, which presents the printing plate signature, is called ClusterCode and is comprehensively analysed here Marking product packaging and labels with DataGrid is a very effective low-cost approach for anti-counterfeit applications for mass products The DataGrid is simply inserted in the package/label design before printing and carries encrypted information about the protected product and a pointer to a database In addition the EpiCode is extracted from each printed DataGrid and is used to identify the corresponding item 2 Methods Fingerprint identification is based on two basic premises: (i) persistence: the basic characteristics of fingerprints do not change with time; and (ii) individuality: the fingerprint is unique to an individual (Pan, 22) The same assumptions are valid for an iris recognition system using the IrisCode (Dau, 1999) Further, (iii) a reasonable alignment between a template (stored in the database) and the input (which needs to be identified) should be established to ensure a reliable comparison To identify the genuine, which means to find the best match between input and template, (iv) an exhaustive search in a large data base is necessary b) iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 1
2 The technology presented in this paper goes beyond standard fingerprint applications in two aspects Since the EpiCode is adherent to the data, an exact alignment is achieved by the image preprocessing, where the code symbols are detected and used as a coordinate system to realize a repeatable measurement Secondly, using the process specific property of sheet-fed offset printing, eg the systematic influence of the printing plate on the EpiCode, the search procedure for identification (one-to-many comparison) could be reduced to a verification (one-to-one comparison) To analyze the influence of the paper roughness on the EpiCode, four different grades of paper (Figure 2) and 3 sheets of each paper grade were printed in the same print run The printing process parameters and the measurement settings, including the used devices and materials, are described in detail in Table 1 Figure 2: Microscopic images (8x) of the four paper substrates (s Table 1) made with the KEYENCE VHX-6 microscope The surface structures are evidently different For example, paper Nr 2 (b) is a glossy cast-coated paper A single printed code symbol measures 127 x 127 µm (height x width) Device/Material Model Comments Platesetter AGFA Xcalibur VLF 24 dpi physical printing resolution, Computer-to-Plate Printing plate AGFA Thermostar P97 83 nm sensitive plate Offset press MAN ROLAND 6 LV Six colours offset press Printing ink Printcom S112Y Black fast drying ink Coating Printcom S24U Dispersion coating, water based varnish Printing unit - Last printing unit, no overrolling, no drying Matrix code DataGrid 3 x 3 graphic symbols, 38 x 38 mm (height x width) Flatbed scanner HP scanjet dpi scan resolution is used (48 dpi optical resolution) Paper grades (Substrates) Nr 1: Twin Coat Nr 2: ZANDERS Mega gloss Nr 3: Niklaselect (Bekk 12) Nr 4: Niklakett Brilliant (4) Long grain, x 7 cm, 3 g/m 2, 46 mm, 3 sheets Long grain, 2 x 74 cm, 1 g/m 2, 13 mm, 3 sheets Short grain, 2 x 74 cm, 8 g/m 2, 7 mm, 3 sheets Short grain, 2 x 74 cm, 8 g/m 2, 7 mm, 3 sheets Table 1: Detailed description of the printing process and the measurement conditions To estimate the discriminatory power of the EpiCode a biometrical analysis of the results is performed (Bon, 28) As a result of a comparisson of two different EpiCodes, one from the reference set (database) and one from the authentication set (probe), the cross is evaluated The higher the coefficient, the higher is the similarity between both EpiCodes All possible comparisons are performed and the correlation coefficients are depicted in a histogram Gaussian distributions are fitted to the measurements and (false acceptance rate) and FRR (false rejection rate) are calculated for defined thresholds of discrimination Finally, the EER (equal error rate) achieved is presented in a ROC (reciever operating characteristic) diagram iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 2
3 reference scan enrollment set authentication scan authentication set n n s s c c Figure 3: Experimental concept: n code number (N=8), c code info (C=8), s sheet number (S=8) Short description of the constellation of comparisons in relation to the color coding is given below: yellow: codes with different information different plate region resp location on sheet (false matches) blue: codes with identical information different plate region resp location on sheet (copies) green: codes with identical information same plate region resp location on sheet (copies in cluster) red: same code identical information, same plate region resp location on sheet (originals) 3 Results Two paper grades, Twin Coat and ZANDERS Mega gloss, are analysed and the results are presented in Figure 4 The copies in a cluster, printed by the same region of the printing plate, show high correlation values This subset of copies contains obviously the printing plate signature which causes a systematic influence on the fingerprint signal (of the subset) called ClusterCode Since only the paper substrate is changing during the printing, the influence of the paper roughness can also be validated The stochastic influence of the substrate surface will try to reduce the Therefore the glossy paper shows higher mean value of the cluster distribution The recognition performances (EER) are estimated regarding EpiCode (print signature, red colored distribution) and ClusterCode (plate signature, green colored distibution) and are presented in Figure As a reference, the distribution of results for printed copies (blue colored) is considered Prob density 1 Paper Nr 1 EpiCode: THR = 467, EER = 1e-48 ClusterCode: THR = 264, EER = 1e-11 µ = 7, σ = 34 µ = 77, σ = 37 µ = 48, σ = 44 µ = 71, σ = Paper Nr 2 EpiCode: THR = 417, EER = 1e-36 ClusterCode: THR = 289, EER = 1e-14 a) Prob density µ = 7, σ = 36 µ = 79, σ = 37 µ = 61, σ = 49 µ = 72, σ = Figure 4: Results of the measurements of 8 consecutive sheets (12 EpiCodes) for paper substrates Twin Coat (a) and ZANDERS Mega gloss (b) A significant differencebetween both ClusterCodes can be observed The EpiCode is a 9-element vector with an amplitude resolution of 4 bits per element b) iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 3
4 Using high-quality printing processes, as the experiment shows, recognition performances of around -4 using EpiCode and around - using ClusterCode are practically achieved ROC curves for EpiCode ROC curves for ClusterCode -2 - FRR Paper Nr 1: EER = 1e-48 Paper Nr 2: EER = 1e Paper Nr 1: EER = 1e-11 Paper Nr 2: EER = 1e-14 Figure : Estimated EER (equal error rates) using EpiCode (print signature) and ClusterCode (plate signature) The amplitude resolution of the EpiCode is reduced from 4 bits/sample (optimum) to 1 bit/sample (minimum) to simulate worst-case conditions caused eg by defocused scan and to estimate the minimal recognition performance (Table 2) This is also important if the size of the database has to be reduced to the minimum for a certain reason, for instance, improvement of storage space or search time The corresponding EER decrease from ~ -4 to ~ -2 for EpiCode and from ~ - to ~ -6 for ClusterCode Threshold / EER Threshold / EER Threshold / EER Threshold / EER Nr Paper grade 4-bit EpiCode 1-bit EpiCode 4-bit ClusterCode 1-bit ClusterCode 1 Twin Coat 467 / 1e / 1e / 1e / 1e-6 2 ZANDERS Mega gloss 417 / 1e / 1e / 1e / 1e-8 3 Niklaselect 484 / 1e / 1e / 1e / 1e-7 4 Niklakett Brilliant 46 / 1e / 1e-2 26 / 1e / 1e-7 Table 2: Estimated recognition performance using the printing process described in Table 1 The paper grade with the best behaviour regarding the ClusterCode (Figure 4b) is selected for the analysis of the long-term stability of the printing process and its impact on the recognition performance A stable process would produce a constant ClusterCode over the whole printing cycle For each thousand sheets a probe of four sheets is analysed (Figure 6) The cross s of all EpiCodes are compared; the distributions of results were taken into account The measurement confirms the stability of the plate signature over 3 printed sheets for the high-quality printing process An example of a low-quality printing process is given below Figure 6: Constellation of the sheet sampling in the long-term stability test: A stack of 3 sheets is printed After each prints 4 sheets are extracted to measure the long-term stability of the ClusterCode Though the ClusterCode remains stable over 3 sheets, certain decrease in EER can be observed (Figure 7) Due to slight changes of some parameters during the printing, deviations in the plate fingerprint signal occur This is a slow process which has no impact on the ClusterCode measured on consecutive sheets iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 4
5 Prob density 1 Paper Nr 2 EpiCode: THR = 417, EER = 1e-36 ClusterCode: THR = 289, EER = 1e-14 µ = 7, σ = 36 µ = 79, σ = 37 µ = 61, σ = 49 µ = 72, σ = Paper Nr 2 EpiCode: THR = 461, EER = 1e-41 ClusterCode: THR = 26, EER = 1e-8 a) Prob density µ = 13, σ = 3 µ = 99, σ = 38 µ =, σ = 61 µ = 731, σ = Figure 7: Long-term stability test for sheet-fed offset print on the substrate ZANDERS Mega gloss (Paper Nr 2): Comparison of the measurements on 8 consecutive sheets (a, 12 EpiCodes) and 3 sheets (b, 24 EpiCodes) A slight offset and widening of the distribution of results for ClusterCode (b) can be observed due to process deviations over 3 sheets The ClusterCode remains stable, the EER decreases from -14 to -8 To understand the difference between low-quality and high-quality printing processes regarding security applications, the behaviour of a quality parameter is shown in Figure 7 The quality parameter is defined according to the theory of digital communications and is a measure of the code symbol transmission quality Its value is calculated before decoding and can also be used directly for print quality control For critical values of the quality parameter below 2 the printed code is considered as non-readable and an automatic identification of the DataGrid is impossible The high-quality printing process is realized in the experimental print run described in Table 1 The low-quality process is realized in an industrial print run using standard paper and ink At each thousand printed sheets one is extracted for control measurement Nearly 2 sheets are printed with 12 DataGrids per sheet (1 sheets measured), the high-quality process is represented with 64 DataGrids per sheet and only 3 sheets (4 sheets measured) The distribution of results for the copies in a cluster, which is not presented here, shows extremely high standard deviation for the low-quality process Generally, significant differences in mean value and standard deviation can be observed According to this, the low-quality process will produce non-readable codes especially at the end of the print run, where the standard deviation increases visibly This clearly shows, that not all printing processes are capable for security printing designed for the usage of automatic authentication algotrithms b) quality parameter quality variation during production high quality process low quality process sheet number / Figure 7: Comparison between estimated values of the quality paramater for high quality and low quality printing processes The error plots show a mean value / standard deviation of 39 / 1 and 26 / 2 for the high and low quality processes, respectively DataGrid codes with a quality parameter lower than 2 cannot be read due to failures in the forward error correction (FEC) algorithm iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page
6 A strong decrease of the recognition performance for the low-quality process is confirmed for both recognition approaches (Figure 8) Due to the small EER for ClusterCode and the produced defect DataGrids, security printing using low-quality or non-approved printing processes is not recommended ROC curves for EpiCode ROC curves for ClusterCode -2 - FRR HQ process: EER = 1e-41 LQ process: EER = 1e HQ process: EER = 1e-8 LQ process: EER = 1e Figure 8: Comparison between estimated EER for high quality (HQ) and low quality (LQ) printing processes 4 Discussion The quantitative comparison of the individual code properties shows a clear dependance between paper surface structure and the achieved EER Rough paper surface will have negative impact on the ClusterCode and a low impact on the EpiCode For a glossy paper printed with fast drying ink it could be shown, that the ClusterCode remains stable during thousands of prints when a high-quality process is used Nevertheless using the introduced quality parameter, quality control can be performed on item level, also by using images from conventional print quality control devices The long-term stability of the ClusterCode could be confirmed A further investigation of the long-term behaviour over a complete production run must be done since it is known that properly developed (post-baked) printing plates may exceed run lengths of a million impressions (Wik, 28) The reliable detection of the plate fingerprint in printed DataGrid codes (ClusterCode approach) can be used for a new kind of security applications based on identification of original prints using reduced databases as shown in Figure 9 Using scans of all printed copies on a single sheet, all product packages produced in a print run can be identified Scanning more sheets will lead to an increase of the size of the database, but also to an increase of the authentication performance of the recognition approach sheet nr 1 High reliability: EER ~ based on EpiCode (all sheets scanned) reference scan of each single package large database, 24 entries sheet nr 21 sheet nr 31 Middle reliability: EER ~ -2 (approx) based on ClusterCode (multiple sheets) reference scan of 2 sheets small database, 24 entries Low reliability: EER ~ -8 based on ClusterCode (single sheet) reference scan of 1 sheet very small database, 12 entries Figure 9: Principal of multilevel-security printing, based on DataGrid, for a standard print run with 2 printed sheets and 12 copies per sheet (24 product packages) iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 6
7 Conclussions and future prospects Using the unique printing plate signature ClusterCode the feasibility of a novel security application has been shown Printing processes with a long-term stability regarding to the ClusterCode should be identified by appropriate measurements Industrial printing field tests will include the use of several sheet-fed offset presses with (high-durability) post-baked printing plates Recently, new approaches for a simplified database search are implemented and tested Further developments are running to combine the advantages of standard mobile coding technologies with the multilevel security options of the DataGrid code (Mal, 29) An example is given in Figure by bicolor DataGrids with DataMatrix code for mobile applications implemented as a color overlay color overlay code image preprocessing DataMatrix low data density automatic color separation basic code DataGrid high data density digital filtering fingerprint EpiCode Figure : Bicolor DataGrids in yellow-black and cyan-magenta with implemented DataMatrix code Acknowledgements We gratefully acknowledge the financial support by the Federal Ministry of Education and Research of Germany (FKZ 2PU11, OPUR project, wwwopur-securede) We acknowledge the support of Mr Rainer Gebhardt and Mr Markus Jung-Diefenbach from manroland AG for performing the high-quality printing tests and providing specific information about the research Many thanks to Mr Thomas Buss from GEWA Etiketten GmbH for supervising the industrial field test References [1] Bonev S and Wirnitzer B, 28, Security printing for product packaging in industrial printing applications, Advances in Printing and Media Technology, 3th International Research Conference of IARIGAI [2] Pankanti S, Prabhakar S and Jain A K, 22, On the individuality of fingerprints, IEEE Transactions on Pattern Analysis and Machine Intelligence, 24, 8, -2 [3] Daugman J, 1999 Recognizing Persons by Their Iris Patterns, in Biometrics: Personal Identification in Networked Society, A K Jain, R Bolle, and S Pankanti, editors, Kluwer Academic Publishers [4] Wikipedia, 28, forensic data [] Maleshliyski S, García F: Integration of anti-counterfeiting features into conventional 2D barcodes for mobile tagging, 29, TAGA 61 st Technical Conference, 1-18 March, 29, New Orleans, USA iarigai, Advances in Printing and Media Technology, Volume XXXVI, No 4, pp 449-4, ISBN Page 7
A Memory Effect in sheet fed offset printing
1 A Memory Effect in sheet fed offset printing 42 nd International IARIGAI Conference, Helsinki, Finland W. Fuchs, M. Dauer, U. Hirn, W. Bauer Institute of Paper, Pulp and Fibre Technology, TU Graz www.tugraz.at
More informationBiometric Authentication for secure e-transactions: Research Opportunities and Trends
Biometric Authentication for secure e-transactions: Research Opportunities and Trends Fahad M. Al-Harby College of Computer and Information Security Naif Arab University for Security Sciences (NAUSS) fahad.alharby@nauss.edu.sa
More informationOn-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor
On-Line, Low-Cost and Pc-Based Fingerprint Verification System Based on Solid- State Capacitance Sensor Mohamed. K. Shahin *, Ahmed. M. Badawi **, and Mohamed. S. Kamel ** *B.Sc. Design Engineer at International
More informationFeature Extraction Techniques for Dorsal Hand Vein Pattern
Feature Extraction Techniques for Dorsal Hand Vein Pattern Pooja Ramsoful, Maleika Heenaye-Mamode Khan Department of Computer Science and Engineering University of Mauritius Mauritius pooja.ramsoful@umail.uom.ac.mu,
More informationBiometric Recognition Techniques
Biometric Recognition Techniques Anjana Doshi 1, Manisha Nirgude 2 ME Student, Computer Science and Engineering, Walchand Institute of Technology Solapur, India 1 Asst. Professor, Information Technology,
More informationThe Use of Static Biometric Signature Data from Public Service Forms
The Use of Static Biometric Signature Data from Public Service Forms Emma Johnson and Richard Guest School of Engineering and Digital Arts, University of Kent, Canterbury, UK {ej45,r.m.guest}@kent.ac.uk
More informationAn Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression
An Efficient Approach for Iris Recognition by Improving Iris Segmentation and Iris Image Compression K. N. Jariwala, SVNIT, Surat, India U. D. Dalal, SVNIT, Surat, India Abstract The biometric person authentication
More informationDistinguishing Identical Twins by Face Recognition
Distinguishing Identical Twins by Face Recognition P. Jonathon Phillips, Patrick J. Flynn, Kevin W. Bowyer, Richard W. Vorder Bruegge, Patrick J. Grother, George W. Quinn, and Matthew Pruitt Abstract The
More informationSVC2004: First International Signature Verification Competition
SVC2004: First International Signature Verification Competition Dit-Yan Yeung 1, Hong Chang 1, Yimin Xiong 1, Susan George 2, Ramanujan Kashi 3, Takashi Matsumoto 4, and Gerhard Rigoll 5 1 Hong Kong University
More informationPrint Biometrics: Recovering Forensic Signatures from Halftone Images
Print Biometrics: Recovering Forensic Signatures from Halftone Images Stephen Pollard, Steven Simske, Guy Adams HPL-2013-1 Keyword(s): document forensics; biometrics; Gabor filters; anti-counterfeiting
More informationResearch on Friction Ridge Pattern Analysis
Research on Friction Ridge Pattern Analysis Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York Research Supported by National Institute
More informationINTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET)
INTERNATIONAL RESEARCH JOURNAL IN ADVANCED ENGINEERING AND TECHNOLOGY (IRJAET) www.irjaet.com ISSN (PRINT) : 2454-4744 ISSN (ONLINE): 2454-4752 Vol. 1, Issue 4, pp.240-245, November, 2015 IRIS RECOGNITION
More informationA New Fake Iris Detection Method
A New Fake Iris Detection Method Xiaofu He 1, Yue Lu 1, and Pengfei Shi 2 1 Department of Computer Science and Technology, East China Normal University, Shanghai 200241, China {xfhe,ylu}@cs.ecnu.edu.cn
More informationIRIS Biometric for Person Identification. By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology
IRIS Biometric for Person Identification By Lakshmi Supriya.D M.Tech 04IT6002 Dept. of Information Technology What are Biometrics? Why are Biometrics used? How Biometrics is today? Iris Iris is the area
More informationISO Verification Fact Sheet
Introduction To maintain scanning efficiency, barcodes need to be printed correctly and be of a high quality. Verification equipment can assist in providing an indication of the print quality of barcodes.
More informationBiometrics - A Tool in Fraud Prevention
Biometrics - A Tool in Fraud Prevention Agenda Authentication Biometrics : Need, Available Technologies, Working, Comparison Fingerprint Technology About Enrollment, Matching and Verification Key Concepts
More informationAn Overview of Biometrics. Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University
An Overview of Biometrics Dr. Charles C. Tappert Seidenberg School of CSIS, Pace University What are Biometrics? Biometrics refers to identification of humans by their characteristics or traits Physical
More informationQuantitative Analysis of Pictorial Color Image Difference
Quantitative Analysis of Pictorial Color Image Difference Robert Chung* and Yoshikazu Shimamura** Keywords: Color, Difference, Image, Colorimetry, Test Method Abstract: The magnitude of E between two simple
More informationProposed Method for Off-line Signature Recognition and Verification using Neural Network
e-issn: 2349-9745 p-issn: 2393-8161 Scientific Journal Impact Factor (SJIF): 1.711 International Journal of Modern Trends in Engineering and Research www.ijmter.com Proposed Method for Off-line Signature
More informationBiometrics and Fingerprint Authentication Technical White Paper
Biometrics and Fingerprint Authentication Technical White Paper Fidelica Microsystems, Inc. 423 Dixon Landing Road Milpitas, CA 95035 1 INTRODUCTION Biometrics, the science of applying unique physical
More informationQuantitative Assessment of the Individuality of Friction Ridge Patterns
Quantitative Assessment of the Individuality of Friction Ridge Patterns Sargur N. Srihari with H. Srinivasan, G. Fang, P. Phatak, V. Krishnaswamy Department of Computer Science and Engineering University
More informationPRINTING QUALITY ENHANCEMENT ACCORDING TO ISO (APPLYING IN ONE OF EGYPTIAN PRINTING-HOUSES) Nasr Mostafa Mohamed Mostafa
PRINTING QUALITY ENHANCEMENT ACCORDING TO ISO 12647-2 (APPLYING IN ONE OF EGYPTIAN PRINTING-HOUSES) Nasr Mostafa Mohamed Mostafa Assistant Professor in Printing, Publishing and Packaging Department, Faculty
More informationBiometrics 2/23/17. the last category for authentication methods is. this is the realm of biometrics
CSC362, Information Security the last category for authentication methods is Something I am or do, which means some physical or behavioral characteristic that uniquely identifies the user and can be used
More informationBiometric Recognition: How Do I Know Who You Are?
Biometric Recognition: How Do I Know Who You Are? Anil K. Jain Department of Computer Science and Engineering, 3115 Engineering Building, Michigan State University, East Lansing, MI 48824, USA jain@cse.msu.edu
More informationOn Demand Package Production for Rigid and Flexible Substrates
On Demand Package Production for Rigid and Flexible Substrates PIRA Inkjet Technology 27.-28.4.2004 Thistle Hotel, Brighton, UK Liisa Hakola Contents VTT Introduction On demand package production Digital
More informationIris Recognition using Hamming Distance and Fragile Bit Distance
IJSRD - International Journal for Scientific Research & Development Vol. 3, Issue 06, 2015 ISSN (online): 2321-0613 Iris Recognition using Hamming Distance and Fragile Bit Distance Mr. Vivek B. Mandlik
More informationEvaluating the Biometric Sample Quality of Handwritten Signatures
Evaluating the Biometric Sample Quality of Handwritten Signatures Sascha Müller 1 and Olaf Henniger 2 1 Technische Universität Darmstadt, Darmstadt, Germany mueller@sec.informatik.tu-darmstadt.de 2 Fraunhofer
More informationIris Recognition using Histogram Analysis
Iris Recognition using Histogram Analysis Robert W. Ives, Anthony J. Guidry and Delores M. Etter Electrical Engineering Department, U.S. Naval Academy Annapolis, MD 21402-5025 Abstract- Iris recognition
More informationPublished by: PIONEER RESEARCH & DEVELOPMENT GROUP (www.prdg.org) 1
IJREAT International Journal of Research in Engineering & Advanced Technology, Volume 2, Issue 2, Apr- Generating an Iris Code Using Iris Recognition for Biometric Application S.Banurekha 1, V.Manisha
More informationUnique and sustainable surface refinement of products with innovative thin films: Ara Authentic. R. Domnick, Ara-Authentic GmbH
Unique and sustainable surface refinement of products with innovative thin films: Ara Authentic R. Domnick, Ara-Authentic GmbH 1 Introduction - About us - Piracy of products a growing problem - Protection
More informationTouchless Fingerprint Recognization System
e-issn 2455 1392 Volume 2 Issue 4, April 2016 pp. 501-505 Scientific Journal Impact Factor : 3.468 http://www.ijcter.com Touchless Fingerprint Recognization System Biju V. G 1., Anu S Nair 2, Albin Joseph
More informationZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION
ZKTECO COLLEGE- FUNDAMENTAL OF FINGER VEIN RECOGNITION What are Finger Veins? Veins are blood vessels which present throughout the body as tubes that carry blood back to the heart. As its name implies,
More informationInternational Journal of Scientific & Engineering Research, Volume 7, Issue 12, December ISSN IJSER
International Journal of Scientific & Engineering Research, Volume 7, Issue 12, December-2016 192 A Novel Approach For Face Liveness Detection To Avoid Face Spoofing Attacks Meenakshi Research Scholar,
More informationIntroduction to Biometrics 1
Introduction to Biometrics 1 Gerik Alexander v.graevenitz von Graevenitz Biometrics, Bonn, Germany May, 14th 2004 Introduction to Biometrics Biometrics refers to the automatic identification of a living
More informationCopyright 2006 Society of Photo-Optical Instrumentation Engineers.
Adam Czajka, Przemek Strzelczyk, ''Iris recognition with compact zero-crossing-based coding'', in: Ryszard S. Romaniuk (Ed.), Proceedings of SPIE - Volume 6347, Photonics Applications in Astronomy, Communications,
More informationH. C. Moog is a family owned medium-sized company founded in 1950 by Henry Cornelius Moog.
Gravure, the decisive plus of sheet-fed printing H. C. Moog is a family owned medium-sized company founded in 1950 by Henry Cornelius Moog. For over 60 years the special focus of our family-owned company
More informationEvaluation of Biometric Systems. Christophe Rosenberger
Evaluation of Biometric Systems Christophe Rosenberger Outline GREYC research lab Evaluation: a love story Evaluation of biometric systems Quality of biometric templates Conclusions & perspectives 2 GREYC
More informationImproved Detection by Peak Shape Recognition Using Artificial Neural Networks
Improved Detection by Peak Shape Recognition Using Artificial Neural Networks Stefan Wunsch, Johannes Fink, Friedrich K. Jondral Communications Engineering Lab, Karlsruhe Institute of Technology Stefan.Wunsch@student.kit.edu,
More informationIris Segmentation & Recognition in Unconstrained Environment
www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume - 3 Issue -8 August, 2014 Page No. 7514-7518 Iris Segmentation & Recognition in Unconstrained Environment ABSTRACT
More informationPalm Vein Recognition System using Directional Coding and Back-propagation Neural Network
, October 21-23, 2015, San Francisco, USA Palm Vein Recognition System using Directional Coding and Back-propagation Neural Network Mark Erwin C. Villariña and Noel B. Linsangan, Member, IAENG Abstract
More informationOn The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems
On The Correlation of Image Size to System Accuracy in Automatic Fingerprint Identification Systems J.K. Schneider, C. E. Richardson, F.W. Kiefer, and Venu Govindaraju Ultra-Scan Corporation, 4240 Ridge
More informationClassification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System
Classification of Features into Strong and Weak Features for an Intelligent Online Signature Verification System Saad Tariq, Saqib Sarwar & Waqar Hussain Department of Electrical Engineering Air University
More information3 Department of Computer science and Application, Kurukshetra University, Kurukshetra, India
Minimizing Sensor Interoperability Problem using Euclidean Distance Himani 1, Parikshit 2, Dr.Chander Kant 3 M.tech Scholar 1, Assistant Professor 2, 3 1,2 Doon Valley Institute of Engineering and Technology,
More informationTitle Goes Here Algorithms for Biometric Authentication
Title Goes Here Algorithms for Biometric Authentication February 2003 Vijayakumar Bhagavatula 1 Outline Motivation Challenges Technology: Correlation filters Example results Summary 2 Motivation Recognizing
More informationPostprint.
http://www.diva-portal.org Postprint This is the accepted version of a paper presented at 2nd IEEE International Conference on Biometrics - Theory, Applications and Systems (BTAS 28), Washington, DC, SEP.
More informationA Fast Segmentation Algorithm for Bi-Level Image Compression using JBIG2
A Fast Segmentation Algorithm for Bi-Level Image Compression using JBIG2 Dave A. D. Tompkins and Faouzi Kossentini Signal Processing and Multimedia Group Department of Electrical and Computer Engineering
More informationXM (Cross Modulated) Screening Technology
XM (Cross Modulated) Screening Technology Increasing Print Quality in a Computer-to-Plate (CtP) Workflow Introduction Eliminating film in the plate-making process has done more than shorten the workflow.
More informationFEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION. Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos
FEASIBILITY STUDY OF PHOTOPLETHYSMOGRAPHIC SIGNALS FOR BIOMETRIC IDENTIFICATION Petros Spachos, Jiexin Gao and Dimitrios Hatzinakos The Edward S. Rogers Sr. Department of Electrical and Computer Engineering,
More informationTECHNICAL SUPPLEMENT. PlateScope. Measurement Method, Process and Integrity
TECHNICAL SUPPLEMENT PlateScope Measurement Method, Process and Integrity December 2006 (1.0) DOCUMENT PURPOSE This document discusses the challenges of accurate modern plate measurement, how consistent
More informationIndividuality of Fingerprints
Individuality of Fingerprints Sargur N. Srihari Department of Computer Science and Engineering University at Buffalo, State University of New York srihari@cedar.buffalo.edu IAI Conference, San Diego, CA
More informationIMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION.
IMPACT OF SIGNATURE LEGIBILITY AND SIGNATURE TYPE IN OFF-LINE SIGNATURE VERIFICATION F. Alonso-Fernandez a, M.C. Fairhurst b, J. Fierrez a and J. Ortega-Garcia a. a Biometric Recognition Group - ATVS,
More informationCOLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES. Do-Guk Kim, Heung-Kyu Lee
COLOR LASER PRINTER IDENTIFICATION USING PHOTOGRAPHED HALFTONE IMAGES Do-Guk Kim, Heung-Kyu Lee Graduate School of Information Security, KAIST Department of Computer Science, KAIST ABSTRACT Due to the
More informationAuthentication using Iris
Authentication using Iris C.S.S.Anupama Associate Professor, Dept of E.I.E, V.R.Siddhartha Engineering College, Vijayawada, A.P P.Rajesh Assistant Professor Dept of E.I.E V.R.Siddhartha Engineering College
More informationImplementing Process Color Printing by Colorimetry
Submitted to the 34th Int l Research Conference, Sept. 9-12, 2007, Grenoble, France Abstract Implementing Process Color Printing by Colorimetry Robert Chung RIT School of Print Media 69 Lomb Memorial Drive,
More informationExperiments with An Improved Iris Segmentation Algorithm
Experiments with An Improved Iris Segmentation Algorithm Xiaomei Liu, Kevin W. Bowyer, Patrick J. Flynn Department of Computer Science and Engineering University of Notre Dame Notre Dame, IN 46556, U.S.A.
More informationTowards Automated Forensic Pen Ink Verification by Spectral Analysis
Towards Automated Forensic Pen Ink Verification by Spectral Analysis Michael Kalbitz 1,2(B), Tobias Scheidat 1,2, Benjamin Yüksel 1, and Claus Vielhauer 1,2 1 Department of Informatics and Media, University
More informationPERFORMANCE TESTING EVALUATION REPORT OF RESULTS
COVER Page 1 / 139 PERFORMANCE TESTING EVALUATION REPORT OF RESULTS Copy No.: 1 CREATED BY: REVIEWED BY: APPROVED BY: Dr. Belen Fernandez Saavedra Dr. Raul Sanchez-Reillo Dr. Raul Sanchez-Reillo Date:
More informationFeature Extraction Technique Based On Circular Strip for Palmprint Recognition
Feature Extraction Technique Based On Circular Strip for Palmprint Recognition Dr.S.Valarmathy 1, R.Karthiprakash 2, C.Poonkuzhali 3 1, 2, 3 ECE Department, Bannari Amman Institute of Technology, Sathyamangalam
More informationMULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE
MULTIMODAL BIOMETRIC SYSTEMS STUDY TO IMPROVE ACCURACY AND PERFORMANCE K.Sasidhar 1, Vijaya L Kakulapati 2, Kolikipogu Ramakrishna 3 & K.KailasaRao 4 1 Department of Master of Computer Applications, MLRCET,
More informationCard IEEE Symposium Series on Computational Intelligence
2015 IEEE Symposium Series on Computational Intelligence Cynthia Sthembile Mlambo Council for Scientific and Industrial Research Information Security Pretoria, South Africa smlambo@csir.co.za Distortion
More informationPreprocessing of Digitalized Engineering Drawings
Modern Applied Science; Vol. 9, No. 13; 2015 ISSN 1913-1844 E-ISSN 1913-1852 Published by Canadian Center of Science and Education Preprocessing of Digitalized Engineering Drawings Matúš Gramblička 1 &
More informationAn Algorithm for Fingerprint Image Postprocessing
An Algorithm for Fingerprint Image Postprocessing Marius Tico, Pauli Kuosmanen Tampere University of Technology Digital Media Institute EO.BOX 553, FIN-33101, Tampere, FINLAND tico@cs.tut.fi Abstract Most
More informationNikhil Gupta *1, Dr Rakesh Dhiman 2 ABSTRACT I. INTRODUCTION
International Journal of Scientific Research in Computer Science, Engineering and Information Technology 2017 IJSRCSEIT Volume 2 Issue 6 ISSN : 2456-3307 An Offline Handwritten Signature Verification Using
More informationColorimetry vs. Densitometry in the Selection of Ink-jet Colorants
Colorimetry vs. Densitometry in the Selection of Ink-jet Colorants E. Baumann, M. Fryberg, R. Hofmann, and M. Meissner ILFORD Imaging Switzerland GmbH Marly, Switzerland Abstract The gamut performance
More informationFingerprint Image Quality Parameters
Fingerprint Image Quality Parameters Muskan Sahi #1, Kapil Arora #2 12 Department of Electronics and Communication 12 RPIIT, Bastara Haryana, India Abstract The quality of fingerprint image determines
More informationVein and Fingerprint Identification Multi Biometric System: A Novel Approach
Vein and Fingerprint Identification Multi Biometric System: A Novel Approach Hatim A. Aboalsamh Abstract In this paper, a compact system that consists of a Biometrics technology CMOS fingerprint sensor
More informationSegmentation of Fingerprint Images
Segmentation of Fingerprint Images Asker M. Bazen and Sabih H. Gerez University of Twente, Department of Electrical Engineering, Laboratory of Signals and Systems, P.O. box 217-75 AE Enschede - The Netherlands
More informationLaser Surface Authentication TM : biometrics for documents and goods
Laser Surface Authentication TM : biometrics for documents and goods Professor Russell Cowburn Professor of Nanotechnology, Department of Physics, Imperial College London, UK. Chief Technical Officer,
More informationFingerprint Feature Extraction Dileep Sharma (Assistant Professor) Electronics and communication Eternal University Baru Sahib, HP India
Volume 4, Issue 7, July 2014 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Shaifali Dogra
More informationCity Research Online. Permanent City Research Online URL:
Lugini, L., Marasco, E., Cukic, B. & Gashi, I. (0). Interoperability in Fingerprint Recognition: A Large-Scale Empirical Study. Paper presented at the rd Annual IEEE/IFIP International Conference on Dependable
More informationIris based Human Identification using Median and Gaussian Filter
Iris based Human Identification using Median and Gaussian Filter Geetanjali Sharma 1 and Neerav Mehan 2 International Journal of Latest Trends in Engineering and Technology Vol.(7)Issue(3), pp. 456-461
More informationAmplitudes Variation of GPR Rebar Reflection Due to the Influence of Concrete Aggregate Scattering
More Info at Open Access Database www.ndt.net/?id=18402 Amplitudes Variation of GPR Rebar Reflection Due to the Influence of Concrete Aggregate Scattering Thomas KIND Federal Institute for Materials Research
More informationEffective and Efficient Fingerprint Image Postprocessing
Effective and Efficient Fingerprint Image Postprocessing Haiping Lu, Xudong Jiang and Wei-Yun Yau Laboratories for Information Technology 21 Heng Mui Keng Terrace, Singapore 119613 Email: hplu@lit.org.sg
More informationReal time verification of Offline handwritten signatures using K-means clustering
Real time verification of Offline handwritten signatures using K-means clustering Alpana Deka 1, Lipi B. Mahanta 2* 1 Department of Computer Science, NERIM Group of Institutions, Guwahati, Assam, India
More informationUser Awareness of Biometrics
Advances in Networks, Computing and Communications 4 User Awareness of Biometrics B.J.Edmonds and S.M.Furnell Network Research Group, University of Plymouth, Plymouth, United Kingdom e-mail: info@network-research-group.org
More informationDESIGN & DEVELOPMENT OF COLOR MATCHING ALGORITHM FOR IMAGE RETRIEVAL USING HISTOGRAM AND SEGMENTATION TECHNIQUES
International Journal of Information Technology and Knowledge Management July-December 2011, Volume 4, No. 2, pp. 585-589 DESIGN & DEVELOPMENT OF COLOR MATCHING ALGORITHM FOR IMAGE RETRIEVAL USING HISTOGRAM
More informationLETTERSET. Prepress Guidelines. LETTERSET Essentials. V1 2019
LETTERSET Prepress Guidelines LETTERSET Essentials V1 2019 www.jaco.de KNOW-HOW OF THIS GUIDE I Process reliability in the Letterset printing process What is Letterset? Letterset is an indirect letterpress
More informationVein pattern recognition. Image enhancement and feature extraction algorithms. Septimiu Crisan, Ioan Gavril Tarnovan, Titus Eduard Crisan.
Vein pattern recognition. Image enhancement and feature extraction algorithms Septimiu Crisan, Ioan Gavril Tarnovan, Titus Eduard Crisan. Department of Electrical Measurement, Faculty of Electrical Engineering,
More informationMulticolor Production Printing Using Computer to Plate Technologies
Multicolor Production Printing Using Computer to Plate Technologies Martin Schmitt-Lewen Heidelberger Druckmaschinen AG Heidelberg, Germany Abstract Conventional printing technologies for high quality
More informationISSN Vol.02,Issue.17, November-2013, Pages:
www.semargroups.org, www.ijsetr.com ISSN 2319-8885 Vol.02,Issue.17, November-2013, Pages:1973-1977 A Novel Multimodal Biometric Approach of Face and Ear Recognition using DWT & FFT Algorithms K. L. N.
More informationAbout user acceptance in hand, face and signature biometric systems
About user acceptance in hand, face and signature biometric systems Aythami Morales, Miguel A. Ferrer, Carlos M. Travieso, Jesús B. Alonso Instituto Universitario para el Desarrollo Tecnológico y la Innovación
More informationRECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA
Bulletin of the Transilvania University of Braşov Series VII: Social Sciences Law Vol. 7 (56) No. 1-2014 RECOGNITION OF A PERSON BASED ON THE CHARACTERISTICS OF THE IRIS AND RETINA I. ARON 1 A. CTIN. MANEA
More informationMultimodal Face Recognition using Hybrid Correlation Filters
Multimodal Face Recognition using Hybrid Correlation Filters Anamika Dubey, Abhishek Sharma Electrical Engineering Department, Indian Institute of Technology Roorkee, India {ana.iitr, abhisharayiya}@gmail.com
More informationA Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition and Mean Absolute Deviation
Sensors & Transducers, Vol. 6, Issue 2, December 203, pp. 53-58 Sensors & Transducers 203 by IFSA http://www.sensorsportal.com A Novel Algorithm for Hand Vein Recognition Based on Wavelet Decomposition
More informationFusing Iris Colour and Texture information for fast iris recognition on mobile devices
Fusing Iris Colour and Texture information for fast iris recognition on mobile devices Chiara Galdi EURECOM Sophia Antipolis, France Email: chiara.galdi@eurecom.fr Jean-Luc Dugelay EURECOM Sophia Antipolis,
More informationExtending Acoustic Microscopy for Comprehensive Failure Analysis Applications
Extending Acoustic Microscopy for Comprehensive Failure Analysis Applications Sebastian Brand, Matthias Petzold Fraunhofer Institute for Mechanics of Materials Halle, Germany Peter Czurratis, Peter Hoffrogge
More informationImpact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function
Impact of Out-of-focus Blur on Face Recognition Performance Based on Modular Transfer Function Fang Hua 1, Peter Johnson 1, Nadezhda Sazonova 2, Paulo Lopez-Meyer 2, Stephanie Schuckers 1 1 ECE Department,
More informationBIOMETRICS BY- VARTIKA PAUL 4IT55
BIOMETRICS BY- VARTIKA PAUL 4IT55 BIOMETRICS Definition Biometrics is the identification or verification of human identity through the measurement of repeatable physiological and behavioral characteristics
More informationAuthenticated Document Management System
Authenticated Document Management System P. Anup Krishna Research Scholar at Bharathiar University, Coimbatore, Tamilnadu Dr. Sudheer Marar Head of Department, Faculty of Computer Applications, Nehru College
More informationImage Averaging for Improved Iris Recognition
Image Averaging for Improved Iris Recognition Karen P. Hollingsworth, Kevin W. Bowyer, and Patrick J. Flynn University of Notre Dame Abstract. We take advantage of the temporal continuity in an iris video
More informationImage Extraction using Image Mining Technique
IOSR Journal of Engineering (IOSRJEN) e-issn: 2250-3021, p-issn: 2278-8719 Vol. 3, Issue 9 (September. 2013), V2 PP 36-42 Image Extraction using Image Mining Technique Prof. Samir Kumar Bandyopadhyay,
More informationPreprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition
Preprocessing and Segregating Offline Gujarati Handwritten Datasheet for Character Recognition Hetal R. Thaker Atmiya Institute of Technology & science, Kalawad Road, Rajkot Gujarat, India C. K. Kumbharana,
More informationImpact of out-of-focus blur on iris recognition
Impact of out-of-focus blur on iris recognition Nadezhda Sazonova 1, Stephanie Schuckers, Peter Johnson, Paulo Lopez-Meyer 1, Edward Sazonov 1, Lawrence Hornak 3 1 Department of Electrical and Computer
More informationRecent research results in iris biometrics
Recent research results in iris biometrics Karen Hollingsworth, Sarah Baker, Sarah Ring Kevin W. Bowyer, and Patrick J. Flynn Computer Science and Engineering Department, University of Notre Dame, Notre
More informationAvailable online at ScienceDirect. Procedia Engineering 113 (2015 )
Available online at www.sciencedirect.com ScienceDirect Procedia Engineering 113 (2015 ) 357 361 International Conference on Oil and Gas Engineering, OGE-2015 Application of electron microscopy method
More informationc IET Digital Library. The copyright for this contribution is held by IET Digital Library. The original publication is available at
Christian Rathgeb and Andreas Uhl, Context-based Texture Analysis for Secure Revocable Iris-Biometric Generation, Proceedings of the 3rd International Conference on Imaging for Crime Detection and Prevention
More informationNON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT:
IJCE January-June 2012, Volume 4, Number 1 pp. 59 67 NON UNIFORM BACKGROUND REMOVAL FOR PARTICLE ANALYSIS BASED ON MORPHOLOGICAL STRUCTURING ELEMENT: A COMPARATIVE STUDY Prabhdeep Singh1 & A. K. Garg2
More informationENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION
ENHANCHED PALM PRINT IMAGES FOR PERSONAL ACCURATE IDENTIFICATION Prof. Rahul Sathawane 1, Aishwarya Shende 2, Pooja Tete 3, Naina Chandravanshi 4, Nisha Surjuse 5 1 Prof. Rahul Sathawane, Information Technology,
More informationPrinting Inks Characteristics
Journal of Materials Science and Engineering B 3 (7) (2013) 464-468 D DAVID PUBLISHING Kateryna Savchenko and Olena Velychko Reprography Department, The Publishing and Printing Institute of the National
More informationShannon Information theory, coding and biometrics. Han Vinck June 2013
Shannon Information theory, coding and biometrics Han Vinck June 2013 We consider The password problem using biometrics Shannon s view on security Connection to Biometrics han Vinck April 2013 2 Goal:
More information