25,505 research outputs found

    An Evaluation of Score Level Fusion Approaches for Fingerprint and Finger-vein Biometrics

    Get PDF
    Biometric systems have to address many requirements, such as large population coverage, demographic diversity, varied deployment environment, as well as practical aspects like performance and spoofing attacks. Traditional unimodal biometric systems do not fully meet the aforementioned requirements making them vulnerable and susceptible to different types of attacks. In response to that, modern biometric systems combine multiple biometric modalities at different fusion levels. The fused score is decisive to classify an unknown user as a genuine or impostor. In this paper, we evaluate combinations of score normalization and fusion techniques using two modalities (fingerprint and finger-vein) with the goal of identifying which one achieves better improvement rate over traditional unimodal biometric systems. The individual scores obtained from finger-veins and fingerprints are combined at score level using three score normalization techniques (min-max, z-score, hyperbolic tangent) and four score fusion approaches (minimum score, maximum score, simple sum, user weighting). The experimental results proved that the combination of hyperbolic tangent score normalization technique with the simple sum fusion approach achieve the best improvement rate of 99.98%.Comment: 10 pages, 5 figures, 3 tables, conference, NISK 201

    A Method for Obtaining Electronic Voting Systems based Voter Confidentiality and Voting Accuracy

    Get PDF
    A Voting is common in our daily life, from electing president to electing committee. A complete electronic voting scheme suitable for all kinds of voting with safe guaranty where the voter?s privacy can be protected. Fingerprint system security have been investigated, including the use of fake fingerprints for masquerading identity, the problem of fingerprint alteration or obfuscation has received very little attention. Fingerprint image quality assessment software (e.g., NFIQ) cannot always detect altered fingerprints since the implicit image quality due to alteration may not change significantly. The main contributions of this Research are-1.Compiling case studies of incidents where individuals were found to have altered their fingerprints for circumventing AFIS.2.Identifying the damages of fingerprint alteration on the accuracy of a commercial fingerprint matcher.3.Classifying the alterations into three major categories and suggesting possible countermeasures.4.Developing a technique to automatically detect altered fingerprints based on analyzing orientation field and minutiae distribution.5.Evaluating the proposed technique and the NFIQ algorithm on a big database of altered fingerprints provided by a law enforcement agency. Experimental results show the feasibility of the proposed approach in detecting altered fingerprints and highlight the need to further pursue this problem

    Biometric Systems

    Get PDF
    Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study

    Finger Vein Recognition with Hybrid Deep Learning Approach

    Get PDF
    Finger vein biometrics is an identification technique based on the vein patterns in fingers, and it has the benefit of being difficult to counterfeit. Due to its high level of security, durability, and performance history, finger vein recognition captures our attention as one of the most significant authentication methods available today. Using a mixed deep learning approach, we investigate the challenge of identifying the finger vein sensor model. Thus far, we use Traditional LSTM architectures for this biometric modality. This work also suggests a brand-new hybrid architecture that shines due to its compactness and a merging with the LSMT layer to be taught. In the experiment, original samples as well as the region of interest data from eight freely available FV-USM datasets are employed. The standard LSTM-based strategy is preferable and produced better outcomes, as seen by the comparison with the earlier approaches. Moreover, the results show that the hybrid CNN and LSTM networks may be used to improve vein detection performance

    CardioCam: Leveraging Camera on Mobile Devices to Verify Users While Their Heart is Pumping

    Get PDF
    With the increasing prevalence of mobile and IoT devices (e.g., smartphones, tablets, smart-home appliances), massive private and sensitive information are stored on these devices. To prevent unauthorized access on these devices, existing user verification solutions either rely on the complexity of user-defined secrets (e.g., password) or resort to specialized biometric sensors (e.g., fingerprint reader), but the users may still suffer from various attacks, such as password theft, shoulder surfing, smudge, and forged biometrics attacks. In this paper, we propose, CardioCam, a low-cost, general, hard-to-forge user verification system leveraging the unique cardiac biometrics extracted from the readily available built-in cameras in mobile and IoT devices. We demonstrate that the unique cardiac features can be extracted from the cardiac motion patterns in fingertips, by pressing on the built-in camera. To mitigate the impacts of various ambient lighting conditions and human movements under practical scenarios, CardioCam develops a gradient-based technique to optimize the camera configuration, and dynamically selects the most sensitive pixels in a camera frame to extract reliable cardiac motion patterns. Furthermore, the morphological characteristic analysis is deployed to derive user-specific cardiac features, and a feature transformation scheme grounded on Principle Component Analysis (PCA) is developed to enhance the robustness of cardiac biometrics for effective user verification. With the prototyped system, extensive experiments involving 25 subjects are conducted to demonstrate that CardioCam can achieve effective and reliable user verification with over 99% average true positive rate (TPR) while maintaining the false positive rate (FPR) as low as 4%

    Handbook of Vascular Biometrics

    Get PDF

    A Framework for Verification in Contactless Secure Physical Access Control and Authentication Systems

    Get PDF
    Biometrics is one of the very popular techniques in user identification for accessing institutions and logging into attendance systems. Currently, some of the existing biometric techniques such as the use of fingerprints are unpopular due to COVID-19 challenges. This paper identifies the components of a framework for secure contactless access authentication. The researcher selected 50 journals from Google scholar which were used to analyze the various components used in a secure contactless access authentication framework. The methodology used for research was based on the scientific approach of research methodology that mainly includes data collection from the 50 selected journals, analysis of the data and assessment of results. The following components were identified: database, sensor camera, feature extraction methods, matching and decision algorithm. Out of the considered journals the most used is CASIA database at 40%, CCD Sensor camera with 56%, Gabor feature extraction method at 44%, Hamming distance for matching at 100% and PCA at 100% was used for decision making. These findings will assist the researcher in providing a guide on the best suitable components. Various researchers have proposed an improvement in the current security systems due to integrity and security problems
    • …
    corecore