577 research outputs found

    Multimodal Biometrics Enhancement Recognition System based on Fusion of Fingerprint and PalmPrint: A Review

    Get PDF
    This article is an overview of a current multimodal biometrics research based on fingerprint and palm-print. It explains the pervious study for each modal separately and its fusion technique with another biometric modal. The basic biometric system consists of four stages: firstly, the sensor which is used for enrolmen

    Preā€registration of latent fingerprints based on orientation field

    Full text link

    Dual iris authentication system using dezert smarandache theory

    Get PDF
    In this paper, a dual iris authentication using Dezert Smarandache theory is presented. The proposed method consists of three main steps: In the first one, the iris images are segmented in order to extract only half iris disc that contains relevant information and is less affected by noise. For that, a Hough transform is used. The segmented images are normalized by Daugman rubber sheet model. In the second step, the normalized images are analyzed by a bench of two 1D Log-Gabor filters to extract the texture characteristics. The encoding is realized with a phase of quantization developed by J. Daugman to generate the binary iris template. For the authentication and the similarity measurement between both binary irises templates, the hamming distances are used with a previously calculated threshold. The score fusion is applied using DSmC combination rule. The proposed method has been tested on a subset of iris database CASIA-IrisV3-Interval. The obtained results give a satisfactory performance with accuracy of 99.96%, FAR of 0%, FRR of 3.89%, EER of 2% and processing time for one iris image of 12.36 s

    Reconstruction of fingerprints from minutiae points

    Get PDF
    Most fingerprint authentication systems utilize minutiae information to compare fingerprint images. During enrollment, the minutiae template of a user\u27s fingerprint is extracted and stored in the database. In this work, we concern ourselves with the amount of fingerprint information that can be elicited from the minutiae template of a user\u27s fingerprint. We demonstrate that minutiae information can reveal substantial details such as the orientation field and class of the (unseen) parent fingerprint that can potentially be used to reconstruct the original fingerprint image.;Given a minutiae template, the proposed method first estimates the orientation map of the parent fingerprint by constructing minutiae triplets. The estimated orientation map is observed to be remarkably consistent with the underlying ridge flow of the unseen parent fingerprint. We also discuss a fingerprint classification technique that utilizes only the minutiae information to determine the class of the fingerprint (Arch, Left loop, Right loop and Whorl). The proposed classifier utilizes various properties of the minutiae distribution such as angular histograms, density, relationship between minutiae pairs, etc. A classification accuracy of 82% is obtained on a subset of the NIST-4 database. This indicates that the seemingly random minutiae distribution of a fingerprint can reveal important class information. (Abstract shortened by UMI.)

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications
    • ā€¦
    corecore