7 research outputs found

    A Dual-Factor Access Control System Based on Device and User Intrinsic Identifiers

    Get PDF
    This paper proposes an access control system based on the simultaneous authentication of what the user has and who the user is. At enrollment phase, the wearable access device (a smart card, key fob, etc.) stores a template that results from the fusion of the intrinsic device identifier and the user biometric identifier. At verification phase, both the device and user identifiers are extracted and matched with the stored template. The device identifier is generated from the start-up values of the SRAM in the device hardware, which are exploited as a Physically Unclonable Function (PUF). Hence, if the device hardware is cloned, the authentic identifier is not generated. The user identifier is obtained from level-1 fingerprint features (directional image and singular points), which are extracted from the fingerprint images captured by the sensor in the access device. Hence, only genuine users with genuine devices are authorized to access and no sensitive information is stored or travels outside the access device. The proposal has been validated by using 560 fingerprints acquired in live by an optical sensor and 560 SRAM-based identifiers

    Fingerprint Orientation Refinement Through Iterative Smoothing

    Get PDF
    We propose a new gradient-based method for the extraction of the orientation field associated to a fingerprint, and a regularisation procedure to improve the orientation field computed from noisy fingerprint images. The regularisation algorithm is based on three new integral operators, introduced and discussed in this paper. A pre-processing technique is also proposed to achieve better performances of the algorithm. The results of a numerical experiment are reported to give an evidence of the efficiency of the proposed algorithm

    A multiscale directional operator and morphological tools for reconnecting broken ridges in fingerprint images

    No full text
    In this paper, we introduce a multiscale operator which, together with some morphological tools, can be used to reconnect broken components of fingerprint images. This operator, which can be applied to both binary and gray-scale pictures, extracts the orientation field of an image by taking into account information parameters of sets of pixels in a given neighborhood and located in different directions. It has proved to be very robust to noise and outperforms the gradient- and directional mask-based methods, generally used for orientation field definition. Although we illustrate its application in the fingerprint domain, the approach described here can be easily extended to images whose components exhibit well-defined directional information. (C) 2007 Pattern Recognition Society. Published by Elsevier Ltd. All rights reserved.41136737

    A new three-stage scheme for fingerprint enhancement and its impact on fingerprint recognition

    Get PDF
    In order to provide safety and security from fraudulent acts, it is necessary to use a reliable biometric identifier. Fingerprint is considered to be one of most effective biometric identifiers because of its universal characteristics. The recognition rate of identification/verification systems depends to a great extent on the quality of the fingerprint image. In a fingerprint recognition system, there are two main phases: 1) extraction of suitable features of fingerprints, and 2) fingerprint matching using those extracted features to find the correspondence and similarity between the fingerprint images. The low quality of fingerprint images provides false minutiae at the stage of feature extraction and reduces the recognition rate of minutiae-based fingerprint matching systems. Use of enhanced fingerprint images improves the recognition rate but at the expense of a substantially increased complexity. The objective of this research is to develop an efficient and cost-effective scheme for enhancing fingerprint images that can improve minutiae extraction rate as well as effectively improve the recognition rate of a minutiae-based fingerprint matching system. In the first part of this thesis, a novel low-complexity three-stage scheme for the enhancement of fingerprint images is developed. In the first stage of the scheme, a linear diffusion filter driven by an orientation field is designed to enhance the low-quality fingerprint image. The computational complexity is reduced by using a simple gradient-based method for estimating the orientation field and by using a small number of iterations. Although some of the broken ridges in the fingerprint image are partially connected after the first stage, this stage has a limitation of not being able to connect ridges broken with wide creases, and also not being able to recover ridges in the smeared regions. To overcome the shortcomings of the first stage, the fingerprint image obtained after the first-stage enhancement is passed through a compensation filter in the second stage. Although the broken ridges in the enhanced fingerprint image after the second stage are fully connected, the ridges affected by smears are only partially recovered. Hence, the output obtained from the second stage is passed through the third-stage enhancement, which has two phases: short-time Fourier transform (STFT) analysis and enhancement by an angular filter. In the first phase, a Gaussian spectral window is used in order to perform the STFT and this window helps to reduce the blocking effect in the enhanced image. In the second phase, the image obtained from the STFT is passed through an angular filter, which significantly improves the overall quality of the fingerprint image. In the second part of this thesis, the effectiveness and usefulness of the proposed enhancement scheme are examined in fingerprint feature extraction and matching for fingerprint recognition applications. For this purpose, a minutiae extraction algorithm is first applied to extract minutiae from fingerprint images and then a minutia-based matching algorithm is applied to the set of extracted minutiae using a hybrid shape and orientation descriptor in order to find similarity between a pair of fingerprints. Extensive experiments are conducted throughout this thesis using a number of challenging benchmark databases chosen from FVC2000, FVC2002 and FVC2004. Simulation results demonstrate not only the effectiveness of the proposed enhancement scheme in improving the subjective and objective qualities of fingerprint images, but also a superior minutiae extraction rate and a recognition accuracy of the fingerprint images enhanced by the proposed scheme at a reduced computational complexity

    Cancellable biometric using matrix approaches

    Get PDF
    PhD ThesisCancellable biometrics endeavour to hide the appearance of a biometric image into a transformed template which prevents the outsider from recognising whom the biometric belongs to. Current research into cancellable biometric methodologies concentrates on the details of biometric traits. This approach has a drawback which cannot possibly be implemented with other biometric technology. To address this problem, this thesis contributes to development of a novel concept for the feature transformation of biometric technology, especially for fingerprints, by utilizing several matrix operations to provide an alternative algorithm in order to produce multi-implementation of the cancellable system. The matrix operations generate the feature element of the input fingerprint image in an irrevocable form of output fingerprint template by ignoring the type of biometric traits unique to fingerprints; thus, the cancellable algorithm can be implemented in different biometrics technologies. The implementation offers a new concept in generating a cancellable template by considering a sequential procedure for the fingerprint processing, in order to allow the authentication process to succeed in authenticating an enquired input. For example, a region of interest (RoI) step is required to provide a square form input to support the system working in a matrix domain. Meanwhile, the input fingerprints are mostly in rectangular form. This thesis contributes a new approach to selecting a certain area of a fingerprint by utilizing the density of ridge frequency and orientation. The implementation of these two enhancement steps reduces the excision process of this significant region of the fingerprint by avoiding the involvement of a non-feature area. Meanwhile, to avoid obtaining an un classified fingerprint, this thesis offers a new approach to the fingerprint image classification process entailing three requirements in classifying the fingerprint: the core point and its number, ridge frequency, and ridge direction; whilst the tented arch (TA) is only an additional requirement. The proposed idea increases both the percentage accuracy in classifying fingerprints and time consuming of the system. For Example, the accuracy of the fingerprint classification improves from less than 41 per cent of the fingerprint to 86.48 per cent in average for all of databases.Directorate General of Higher Education of the Ministry of Education and Culture of the Republic of Indonesi

    Global and local feature-based transformations for fingerprint data protection

    Get PDF
    Due to its non-shareable characteristic, biometrics has been widely implemented for authenticating users. This characteristic asserts that biometrics meets the non-repudiation requirement which is one of the key factors in the authentication system. Among biometric modalities, fingerprints have the best capability for satisfying both technical and social aspects of an authentication system. Nevertheless, similar to other modalities, once the stored fingerprint template has been compromised, the effect will be forever since the fingerprint pattern is permanent. So, a mechanism which can protect this fingerprint pattern is desired. Common cryptographic approaches, however, do not work due to uncertainty in the captured fingerprint image caused by disturbing factors either in the scanner or in the finger itself. While authenticating fingerprints in a plain format is not secure, in a cipher format it is impractical because slightly different inputs result in completely different outputs. Therefore, a specific transformation mechanism is needed: one which is able to accept similar fingerprints and reject dissimilar fingerprints, while at the same time generating a relatively non-invertible fingerprint template. Most of the existing protection approaches, however, have high error rates which make them inappropriate to implement. The approaches proposed in this thesis are for addressing this problem, in particular. The proposed approaches comprise three modules: feature transformation, feature representation and feature comparison. The evaluation is to measure the accuracy, the capability for revoking the template and generating another template, and the capability for scrambling the fingerprint pattern. The first approach, which is a global feature-based transformation, is developed by exploring both the fingerprint singular point and minutiae points. The experimental results show that this approach is able to improve the existing performance, despite possible limitations (e.g., relying on the core point). In order to eliminate possible drawbacks of that global feature-based transformation, a local-based transformation is implemented by extracting only minutiae points. This has been able to eliminate the core-point dependency and at the same time produce only a slightly higher error rate than the previous proposed approach. To make further improvements, the third approach is designed in both Cartesian and polar coordinate spaces. This approach has been able to take advantages of being core point independent and at the same time generates higher performance than most of the existing approaches

    CONTACTLESS FINGERPRINT BIOMETRICS: ACQUISITION, PROCESSING, AND PRIVACY PROTECTION

    Get PDF
    Biometrics is defined by the International Organization for Standardization (ISO) as \u201cthe automated recognition of individuals based on their behavioral and biological characteristics\u201d Examples of distinctive features evaluated by biometrics, called biometric traits, are behavioral characteristics like the signature, gait, voice, and keystroke, and biological characteristics like the fingerprint, face, iris, retina, hand geometry, palmprint, ear, and DNA. The biometric recognition is the process that permits to establish the identity of a person, and can be performed in two modalities: verification, and identification. The verification modality evaluates if the identity declared by an individual corresponds to the acquired biometric data. Differently, in the identification modality, the recognition application has to determine a person's identity by comparing the acquired biometric data with the information related to a set of individuals. Compared with traditional techniques used to establish the identity of a person, biometrics offers a greater confidence level that the authenticated individual is not impersonated by someone else. Traditional techniques, in fact, are based on surrogate representations of the identity, like tokens, smart cards, and passwords, which can easily be stolen or copied with respect to biometric traits. This characteristic permitted a wide diffusion of biometrics in different scenarios, like physical access control, government applications, forensic applications, logical access control to data, networks, and services. Most of the biometric applications, also called biometric systems, require performing the acquisition process in a highly controlled and cooperative manner. In order to obtain good quality biometric samples, the acquisition procedures of these systems need that the users perform deliberate actions, assume determinate poses, and stay still for a time period. Limitations regarding the applicative scenarios can also be present, for example the necessity of specific light and environmental conditions. Examples of biometric technologies that traditionally require constrained acquisitions are based on the face, iris, fingerprint, and hand characteristics. Traditional face recognition systems need that the users take a neutral pose, and stay still for a time period. Moreover, the acquisitions are based on a frontal camera and performed in controlled light conditions. Iris acquisitions are usually performed at a distance of less than 30 cm from the camera, and require that the user assume a defined pose and stay still watching the camera. Moreover they use near infrared illumination techniques, which can be perceived as dangerous for the health. Fingerprint recognition systems and systems based on the hand characteristics require that the users touch the sensor surface applying a proper and uniform pressure. The contact with the sensor is often perceived as unhygienic and/or associated to a police procedure. This kind of constrained acquisition techniques can drastically reduce the usability and social acceptance of biometric technologies, therefore decreasing the number of possible applicative contexts in which biometric systems could be used. In traditional fingerprint recognition systems, the usability and user acceptance are not the only negative aspects of the used acquisition procedures since the contact of the finger with the sensor platen introduces a security lack due to the release of a latent fingerprint on the touched surface, the presence of dirt on the surface of the finger can reduce the accuracy of the recognition process, and different pressures applied to the sensor platen can introduce non-linear distortions and low-contrast regions in the captured samples. Other crucial aspects that influence the social acceptance of biometric systems are associated to the privacy and the risks related to misuses of biometric information acquired, stored and transmitted by the systems. One of the most important perceived risks is related to the fact that the persons consider the acquisition of biometric traits as an exact permanent filing of their activities and behaviors, and the idea that the biometric systems can guarantee recognition accuracy equal to 100\% is very common. Other perceived risks consist in the use of the collected biometric data for malicious purposes, for tracing all the activities of the individuals, or for operating proscription lists. In order to increase the usability and the social acceptance of biometric systems, researchers are studying less-constrained biometric recognition techniques based on different biometric traits, for example, face recognition systems in surveillance applications, iris recognition techniques based on images captured at a great distance and on the move, and contactless technologies based on the fingerprint and hand characteristics. Other recent studies aim to reduce the real and perceived privacy risks, and consequently increase the social acceptance of biometric technologies. In this context, many studies regard methods that perform the identity comparison in the encrypted domain in order to prevent possible thefts and misuses of biometric data. The objective of this thesis is to research approaches able to increase the usability and social acceptance of biometric systems by performing less-constrained and highly accurate biometric recognitions in a privacy compliant manner. In particular, approaches designed for high security contexts are studied in order improve the existing technologies adopted in border controls, investigative, and governmental applications. Approaches based on low cost hardware configurations are also researched with the aim of increasing the number of possible applicative scenarios of biometric systems. The privacy compliancy is considered as a crucial aspect in all the studied applications. Fingerprint is specifically considered in this thesis, since this biometric trait is characterized by high distinctivity and durability, is the most diffused trait in the literature, and is adopted in a wide range of applicative contexts. The studied contactless biometric systems are based on one or more CCD cameras, can use two-dimensional or three-dimensional samples, and include privacy protection methods. The main goal of these systems is to perform accurate and privacy compliant recognitions in less-constrained applicative contexts with respect to traditional fingerprint biometric systems. Other important goals are the use of a wider fingerprint area with respect to traditional techniques, compatibility with the existing databases, usability, social acceptance, and scalability. The main contribution of this thesis consists in the realization of novel biometric systems based on contactless fingerprint acquisitions. In particular, different techniques for every step of the recognition process based on two-dimensional and three-dimensional samples have been researched. Novel techniques for the privacy protection of fingerprint data have also been designed. The studied approaches are multidisciplinary since their design and realization involved optical acquisition systems, multiple view geometry, image processing, pattern recognition, computational intelligence, statistics, and cryptography. The implemented biometric systems and algorithms have been applied to different biometric datasets describing a heterogeneous set of applicative scenarios. Results proved the feasibility of the studied approaches. In particular, the realized contactless biometric systems have been compared with traditional fingerprint recognition systems, obtaining positive results in terms of accuracy, usability, user acceptability, scalability, and security. Moreover, the developed techniques for the privacy protection of fingerprint biometric systems showed satisfactory performances in terms of security, accuracy, speed, and memory usage
    corecore