129 research outputs found

    A Hand-Based Biometric Verification System Using Ant Colony Optimization

    Get PDF
    This paper presents a novel personal authentication system using hand-based biometrics, which utilizes internal (beneath the skin) structure of veins on the dorsal part of the hand and the outer shape of the hand. The hand-vein and the hand-shape images can be simultaneously acquired by using infrared thermal and digital camera respectively. A claimed identity is authenticated by integrating these two traits based on the score-level fusion in which four fusion rules are used for the integration. Before their fusion, each modality is evaluated individually in terms of error rates and weights are assigned according to their performance. In order to achieve an adaptive security in the proposed bimodal system, an optimal selection of fusion parameters is required. Hence, Ant Colony Optimization (ACO) is employed in the bimodal system to select the weights and also one out of the four fusion rules optimally for the adaptive fusion of the two modalities to meet the user defined security levels. The databases of hand-veins and the hand-shapes consisting of 150 users are acquired using the peg-free imaging setup. The experimental results show genuine acceptance rate (GAR) of 98% at false acceptance rate (FAR) of 0.001% and the system has the potential for any online personal authentication based application.

    Hand Geometry Techniques: A Review

    Full text link
    Volume 2 Issue 11 (November 2014

    Personal recognition using hand shape and texture

    Get PDF
    Author name used in this publication: Ajay Kumar2006-2007 > Academic research: refereed > Publication in refereed journalVersion of RecordPublishe

    Integrating shape and texture for hand verification

    Get PDF
    Author name used in this publication: Ajay KumarAuthor name used in this publication: David ZhangRefereed conference paper2004-2005 > Academic research: refereed > Refereed conference paperVersion of RecordPublishe

    Combination a Skeleton Filter and Reduction Dimension of Kernel PCA Based on Palmprint Recognition

    Get PDF
    Palmprint identification is part of biometric recognition, which attracted many researchers, especially when fusion with face identification that will be applied in the airport to hasten knowing individual identity. To accelerate the process of verification feature palms, dimension reduction method is the dominant technique to extract the feature information of palms.The mechanism will boost if the ROI images are processed prior to get normalize image enhancement.In this paper with three sample input database, a kernel PCA method used as a dimension reduction compared with three others and a skeleton filter used as a image enhancement method compared with six others. The final results show that the proposed method successfully achieve the target in terms of the processing time of 0.7415 0.7415 second, the EER performance rate of 0.19 % and the success of verification process about 99,82 %

    A Bimodal Biometric Student Attendance System

    Get PDF
    A lot of attempts have been made to use biometrics in class attendance systems. Most of the implemented biometric attendance systems are unimodal. Unimodal biometric systems may be spoofed easily, leading to a reduction in recognition accuracy. This paper explores the use of bimodal biometrics to improve the recognition accuracy of automated student attendance systems. The system uses the face and fingerprint to take students’ attendance. The students’ faces were captured using webcam and preprocessed by converting the color images to grey scale images. The grey scale images were then normalized to reduce noise. Principal Component Analysis (PCA) algorithm was used for facial feature extraction while Support Vector Machine (SVM) was used for classification. Fingerprints were captured using a fingerprint reader. A thinning algorithm digitized and extracted the minutiae from the scanned fingerprints. The logical technique (OR) was used to fuse the two biometric data at the decision level. The fingerprint templates and facial images of each user were stored along with their particulars in a database. The implemented system had a minimum recognition accuracy of 87.83%

    Edge-centric multimodal authentication system using encrypted biometric templates

    Get PDF
    Data security, complete system control, and missed storage and computing opportunities in personal portable devices are some of the major limitations of the centralized cloud environment. Among these limitations, security is a prime concern due to potential unauthorized access to private data. Biometrics, in particular, is considered sensitive data, and its usage is subject to the privacy protection law. To address this issue, a multimodal authentication system using encrypted biometrics for the edge-centric cloud environment is proposed in this study. Personal portable devices are utilized for encrypting biometrics in the proposed system, which optimizes the use of resources and tackles another limitation of the cloud environment. Biometrics is encrypted using a new method. In the proposed system, the edges transmit the encrypted speech and face for processing in the cloud. The cloud then decrypts the biometrics and performs authentication to confirm the identity of an individual. The model for speech authentication is based on two types of features, namely, Mel-frequency cepstral coefficients and perceptual linear prediction coefficients. The model for face authentication is implemented by determining the eigenfaces. The final decision about the identity of a user is based on majority voting. Experimental results show that the new encryption method can reliably hide the identity of an individual and accurately decrypt the biometrics, which is vital for errorless authentication
    corecore