782 research outputs found

    VLSI smart sensor-processor for fingerprint comparison

    Get PDF

    Handbook of Vascular Biometrics

    Get PDF

    Fabrication of 3D Fingerprint Phantoms via Unconventional Polycarbonate Molding

    Get PDF
    Fingerprint biometrics is a valuable and convenient security tool; every fingerprint is highly detailed and unique, we always have them on “hand”. Herein we describe a novel bench-top method of making 3D fingerprint replicas (namely, fingerprint phantoms) by exploring a unique microfabrication approach using conventional polymeric materials, to aid the development of reliable and accurate fingerprint biometrics. By pressing an impression of human fingerprints onto solvent-softened plastic plates (e.g., polycarbonate chips), followed by casting with polydimethylsiloxane (PDMS, a popular elastomer), we can produce a flexible, nanoscale detailed, 3D reproduction of the fingerprint (“phantom”). By testing with standard optical fingerprint scanners, we have shown that all three levels of fingerprint details can be precisely recorded and match well with the original fingerprint. Superior to artificial fingerprint patterns, these phantoms have the exact 3D features of fingerprints and introduce no variability compared to human sampling, which make them perfect targets for standardizing fingerprint scanners and for biometric applications. We envision that the microcontact replication protocol via unconventional PC molding promises a practical, bench-top, instrumentation-free method to mass reproduce many other micro/nanostructures with high fidelity

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    Mobile personal authentication using fingerprint.

    Get PDF
    Cheng Po Sum.Thesis submitted in: July 2003.Thesis (M.Phil.)--Chinese University of Hong Kong, 2004.Includes bibliographical references (leaves 64-67).Abstracts in English and Chinese.List of Figures --- p.iList of Tables --- p.iiiAcknowledgments --- p.iv摘要 --- p.vThesis Abstract --- p.viChapter 1. --- Mobile Commerce --- p.1Chapter 1.1 --- Introduction to Mobile Commerce --- p.1Chapter 1.2 --- Mobile commence payment systems --- p.2Chapter 1.3 --- Security in mobile commerce --- p.5Chapter 2. --- Mobile authentication using Fingerprint --- p.10Chapter 2.1 --- Authentication basics --- p.10Chapter 2.2 --- Fingerprint basics --- p.12Chapter 2.3 --- Fingerprint authentication using mobile device --- p.15Chapter 3. --- Design of Mobile Fingerprint Authentication Device --- p.19Chapter 3.1 --- Objectives --- p.19Chapter 3.2 --- Hardware and software design --- p.21Chapter 3.2.1 --- Choice of hardware platform --- p.21Chapter 3.3 --- Experiments --- p.25Chapter 3.3.1 --- Design methodology I - DSP --- p.25Chapter 3.3.1.1 --- Hardware platform --- p.25Chapter 3.3.1.2 --- Software platform --- p.26Chapter 3.3.1.3 --- Implementation --- p.26Chapter 3.3.1.4 --- Experiment and result --- p.27Chapter 3.3.2 --- Design methodology II ´ؤ SoC --- p.28Chapter 3.3.2.1 --- Hardware components --- p.28Chapter 3.3.2.2 --- Software components --- p.29Chapter 3.3.2.3 --- Implementation Department of Computer Science and Engineering --- p.29Chapter 3.3.2.4 --- Experiment and result --- p.30Chapter 3.4 --- Observation --- p.30Chapter 4. --- Implementation of the Device --- p.31Chapter 4.1 --- Choice of platforms --- p.31Chapter 4.2 --- Implementation Details --- p.31Chapter 4.2.1 --- Hardware implementation --- p.31Chapter 4.2.1.1 --- Atmel FingerChip --- p.32Chapter 4.2.1.2 --- Gemplus smart card and reader --- p.33Chapter 4.2.2 --- Software implementation --- p.33Chapter 4.2.2.1 --- Operating System --- p.33Chapter 4.2.2.2 --- File System --- p.33Chapter 4.2.2.3 --- Device Driver --- p.35Chapter 4.2.2.4 --- Smart card --- p.38Chapter 4.2.2.5 --- Fingerprint software --- p.41Chapter 4.2.2.6 --- Graphical user interface --- p.41Chapter 4.3 --- Results and observations --- p.44Chapter 5. --- An Application Example 一 A Penalty Ticket Payment System (PTPS) --- p.47Chapter 5.1 --- Requirement --- p.47Chapter 5.2 --- Design Principles --- p.48Chapter 5.3 --- Implementation --- p.52Chapter 5.4 --- Results and Observation --- p.57Chapter 6. --- Conclusions and future work --- p.62Chapter 7. --- References --- p.6

    Biometric Systems

    Get PDF
    Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study

    Empreintes audio et stratégies d'indexation associées pour l'identification audio à grande échelle

    Get PDF
    N this work we give a precise definition of large scale audio identification. In particular, we make a distinction between exact and approximate matching. In the first case, the goal is to match two signals coming from one same recording with different post-processings. In the second case, the goal is to match two signals that are musically similar. In light of these definitions, we conceive and evaluate different audio-fingerprint models.Dans cet ouvrage, nous définissons précisément ce qu’est l’identification audio à grande échelle. En particulier, nous faisons une distinction entre l’identification exacte, destinée à rapprocher deux extraits sonores provenant d’un même enregistrement, et l’identification approchée, qui gère également la similarité musicale entre les signaux. A la lumière de ces définitions, nous concevons et examinons plusieurs modèles d’empreinte audio et évaluons leurs performances, tant en identification exacte qu’en identificationapprochée

    A Biometric Approach to Prevent False Use of IDs

    Get PDF
    What is your username? What is your password? What is your PIN number? These are some of the commonly used key questions users need to answer accurately in order to verify their identity and gain access to systems and their own data. Passwords, Personal Identification Numbers (PINs) and ID cards are different means of tokens used to identify a person, but these can be forgotten, stolen or lost. Currently, University of Hertfordshire (UH) carries out identity checks by checking the photograph on an ID card during exams. Other processes such as attendance monitoring and door access control require tapping the ID card on a reader. These methods can cause issues such as unauthorised use of ID card on attendance system and door access system if ID card is found, lost or borrowed. During exams, this could lead to interruptions when carrying out manual checks. As the invigilator carries out checks whilst the student is writing an exam, it is often difficult to see the student’s face as they face down whilst writing the exam. They cannot be disturbed for the ID check process. Students are also required to sign a manual register as they walk into the exam room. This process is time consuming. A more robust approach to identification of individuals that can avoid the above mentioned limitations of the traditional means, is the use of biometrics. Fingerprint was the first biometric modality that has been used. In comparison to other biometric modalities such as signature and face recognition, fingerprint is highly unique, accepted and leads to a more accurate matching result. Considering these properties of fingerprint biometrics, it has been explored in the research study presented in this thesis to enhance the efficiency and the reliability of the University’s exam process. This thesis focuses on using fingerprint recognition technology in a novel approach to check identity for exams in a University environment. Identifying a user using fingerprints is not the only aim of this project. Convenience and user experience play vital roles in this project whilst improving speed and processes at UH

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book
    corecore