10 research outputs found
Contactless Palmprint Recognition System: A Survey
Information systems in organizations traditionally require users to remember their secret
pins or (passwords), token, card number, or both to con�rm their identities. However, the technological
trend has been moving towards personal identi�cation based on individual behavioural attributes (such as
gaits, signature, and voice) or physiological attributes (such as palmprint, �ngerprint, face, iris, or ear).
These attributes (biometrics) offer many advantages over knowledge and possession-based approaches. For
example, palmprint images have rich, unique features for reliable human identi�cation, and it has received
signi�cant attention due to their stability, reliability, uniqueness, and non-intrusiveness. This paper provides
an overview and evaluation of contactless palmprint recognition system, the state-of-the-art performance of
existing studies, different types of ``Region of Interest'' (ROI) extraction algorithms, feature extraction, and
matching algorithms. Finally, the �ndings obtained are presented and discussed
Privacy-Preserving Biometric Authentication
Biometric-based authentication provides a highly accurate means of authentication without requiring the user to memorize or possess anything. However, there are three disadvantages to the use of biometrics in authentication; any compromise is permanent as it is impossible to revoke biometrics; there are significant privacy concerns with the loss of biometric data; and humans possess only a limited number of biometrics, which limits how many services can use or reuse the same form of authentication.
As such, enhancing biometric template security is of significant research interest. One of the methodologies is called cancellable biometric template which applies an irreversible transformation on the features of the biometric sample and performs the matching in the transformed domain. Yet, this is itself susceptible to specific classes of attacks, including hill-climb, pre-image, and attacks via records multiplicity.
This work has several outcomes and contributions to the knowledge of privacy-preserving biometric authentication. The first of these is a taxonomy structuring the current state-of-the-art and provisions for future research. The next of these is a multi-filter framework for developing a robust and secure cancellable biometric template, designed specifically for fingerprint biometrics. This framework is comprised of two modules, each of which is a separate cancellable fingerprint template that has its own matching and measures. The matching for this is based on multiple thresholds. Importantly, these methods show strong resistance to the above-mentioned attacks. Another of these outcomes is a method that achieves a stable performance and can be used to be embedded into a Zero-Knowledge-Proof protocol. In this novel method, a new strategy was proposed to improve the recognition error rates which is privacy-preserving in the untrusted environment. The results show promising performance when evaluated on current datasets
Signal processing and machine learning techniques for human verification based on finger textures
PhD ThesisIn recent years, Finger Textures (FTs) have attracted considerable
attention as potential biometric characteristics. They can provide
robust recognition performance as they have various human-speci c
features, such as wrinkles and apparent lines distributed along the
inner surface of all ngers. The main topic of this thesis is verifying
people according to their unique FT patterns by exploiting signal
processing and machine learning techniques.
A Robust Finger Segmentation (RFS) method is rst proposed to
isolate nger images from a hand area. It is able to detect the ngers
as objects from a hand image. An e cient adaptive nger
segmentation method is also suggested to address the problem of
alignment variations in the hand image called the Adaptive and Robust
Finger Segmentation (ARFS) method.
A new Multi-scale Sobel Angles Local Binary Pattern (MSALBP)
feature extraction method is proposed which combines the Sobel
direction angles with the Multi-Scale Local Binary Pattern (MSLBP).
Moreover, an enhanced method called the Enhanced Local Line Binary
Pattern (ELLBP) is designed to e ciently analyse the FT patterns. As
a result, a powerful human veri cation scheme based on nger Feature
Level Fusion with a Probabilistic Neural Network (FLFPNN) is
proposed. A multi-object fusion method, termed the Finger
Contribution Fusion Neural Network (FCFNN), combines the
contribution scores of the nger objects.
The veri cation performances are examined in the case of missing FT
areas. Consequently, to overcome nger regions which are poorly
imaged a method is suggested to salvage missing FT elements by
exploiting the information embedded within the trained Probabilistic
Neural Network (PNN). Finally, a novel method to produce a Receiver
Operating Characteristic (ROC) curve from a PNN is suggested.
Furthermore, additional development to this method is applied to
generate the ROC graph from the FCFNN.
Three databases are employed for evaluation: The Hong Kong
Polytechnic University Contact-free 3D/2D (PolyU3D2D), Indian
Institute of Technology (IIT) Delhi and Spectral 460nm (S460) from
the CASIA Multi-Spectral (CASIAMS) databases. Comparative
simulation studies con rm the e ciency of the proposed methods for
human veri cation.
The main advantage of both segmentation approaches, the RFS and
ARFS, is that they can collect all the FT features. The best results
have been benchmarked for the ELLBP feature extraction with the
FCFNN, where the best Equal Error Rate (EER) values for the three
databases PolyU3D2D, IIT Delhi and CASIAMS (S460) have been
achieved 0.11%, 1.35% and 0%, respectively. The proposed salvage
approach for the missing feature elements has the capability to enhance
the veri cation performance for the FLFPNN. Moreover, ROC graphs
have been successively established from the PNN and FCFNN.the ministry of higher
education and scientific research in Iraq (MOHESR); the Technical
college of Mosul; the Iraqi Cultural Attach e; the active people in the
MOHESR, who strongly supported Iraqi students
Lip print based authentication in physical access control Environments
Abstract: In modern society, there is an ever-growing need to determine the identity of a person in many applications including computer security, financial transactions, borders, and forensics. Early automated methods of authentication relied mostly on possessions and knowledge. Notably these authentication methods such as passwords and access cards are based on properties that can be lost, stolen, forgotten, or disclosed. Fortunately, biometric recognition provides an elegant solution to these shortcomings by identifying a person based on their physiological or behaviourial characteristics. However, due to the diverse nature of biometric applications (e.g., unlocking a mobile phone to cross an international border), no biometric trait is likely to be ideal and satisfy the criteria for all applications. Therefore, it is necessary to investigate novel biometric modalities to establish the identity of individuals on occasions where techniques such as fingerprint or face recognition are unavailable. One such modality that has gained much attention in recent years which originates from forensic practices is the lip. This research study considers the use of computer vision methods to recognise different lip prints for achieving the task of identification. To determine whether the research problem of the study is valid, a literature review is conducted which helps identify the problem areas and the different computer vision methods that can be used for achieving lip print recognition. Accordingly, the study builds on these areas and proposes lip print identification experiments with varying models which identifies individuals solely based on their lip prints and provides guidelines for the implementation of the proposed system. Ultimately, the experiments encapsulate the broad categories of methods for achieving lip print identification. The implemented computer vision pipelines contain different stages including data augmentation, lip detection, pre-processing, feature extraction, feature representation and classification. Three pipelines were implemented from the proposed model which include a traditional machine learning pipeline, a deep learning-based pipeline and a deep hybridlearning based pipeline. Different metrics reported in literature are used to assess the performance of the prototype such as IoU, mAP, accuracy, precision, recall, F1 score, EER, ROC curve, PR curve, accuracy and loss curves. The first pipeline of the current study is a classical pipeline which employs a facial landmark detector (One Millisecond Face Alignment algorithm) to detect the lip, SURF for feature extraction, BoVW for feature representation and an SVM or K-NN classifier. The second pipeline makes use of the facial landmark detector and a VGG16 or ResNet50 architecture. The findings reveal that the ResNet50 is the best performing method for lip print identification for the current study. The third pipeline also employs the facial landmark detector, the ResNet50 architecture for feature extraction with an SVM classifier. The development of the experiments is validated and benchmarked to determine the extent or performance at which it can achieve lip print identification. The results of the benchmark for the prototype, indicate that the study accomplishes the objective of identifying individuals based on their lip prints using computer vision methods. The results also determine that the use of deep learning architectures such as ResNet50 yield promising results.M.Sc. (Science