155 research outputs found

    Biometric Systems

    Get PDF
    Biometric authentication has been widely used for access control and security systems over the past few years. The purpose of this book is to provide the readers with life cycle of different biometric authentication systems from their design and development to qualification and final application. The major systems discussed in this book include fingerprint identification, face recognition, iris segmentation and classification, signature verification and other miscellaneous systems which describe management policies of biometrics, reliability measures, pressure based typing and signature verification, bio-chemical systems and behavioral characteristics. In summary, this book provides the students and the researchers with different approaches to develop biometric authentication systems and at the same time includes state-of-the-art approaches in their design and development. The approaches have been thoroughly tested on standard databases and in real world applications

    Process of Fingerprint Authentication using Cancelable Biohashed Template

    Get PDF
    Template protection using cancelable biometrics prevents data loss and hacking stored templates, by providing considerable privacy and security. Hashing and salting techniques are used to build resilient systems. Salted password method is employed to protect passwords against different types of attacks namely brute-force attack, dictionary attack, rainbow table attacks. Salting claims that random data can be added to input of hash function to ensure unique output. Hashing salts are speed bumps in an attacker’s road to breach user’s data. Research proposes a contemporary two factor authenticator called Biohashing. Biohashing procedure is implemented by recapitulated inner product over a pseudo random number generator key, as well as fingerprint features that are a network of minutiae. Cancelable template authentication used in fingerprint-based sales counter accelerates payment process. Fingerhash is code produced after applying biohashing on fingerprint. Fingerhash is a binary string procured by choosing individual bit of sign depending on a preset threshold. Experiment is carried using benchmark FVC 2002 DB1 dataset. Authentication accuracy is found to be nearly 97\%. Results compared with state-of art approaches finds promising

    A Robust Face Recognition System Based on Curvelet and Fractal Dimension Transforms

    Get PDF
    yesn this paper, a powerful face recognition system for authentication and identification tasks is presented and a new facial feature extraction approach is proposed. A novel feature extraction method based on combining the characteristics of the Curvelet transform and Fractal dimension transform is proposed. The proposed system consists of four stages. Firstly, a simple preprocessing algorithm based on a sigmoid function is applied to standardize the intensity dynamic range in the input image. Secondly, a face detection stage based on the Viola-Jones algorithm is used for detecting the face region in the input image. After that, the feature extraction stage using a combination of the Digital Curvelet via wrapping transform and a Fractal Dimension transform is implemented. Finally, the K-Nearest Neighbor (K-NN) and Correlation Coefficient (CC) Classifiers are used in the recognition task. Lastly, the performance of the proposed approach has been tested by carrying out a number of experiments on three well-known datasets with high diversity in the facial expressions: SDUMLA-HMT, Faces96 and UMIST datasets. All the experiments conducted indicate the robustness and the effectiveness of the proposed approach for both authentication and identification tasks compared to other established approaches

    Multimodal biometric authentication using ECG and fingerprint

    Get PDF
    Biometric system is a very important recognition system which is used for individual verification and identification. Various types of biometric traits are used in today's world, in which some are used for commercial purpose and few used for verification purpose. Existing authentication techniques are suffer from different errors like mismatch image, spoofing, falsification in the data, to solve this errors the combination of Electrocardiography(ECG) and fingerprint multimodal is introduced. This proposed modal produces effective recognition system when compared to individual recognition system. The proposed multimodal recognition system provides optimum results compared to the individual recognition system which yields better results for authentication compared to the Existing system

    Influencing brain waves by evoked potentials as biometric approach: taking stock of the last six years of research

    Get PDF
    The scientific advances of recent years have made available to anyone affordable hardware devices capable of doing something unthinkable until a few years ago, the reading of brain waves. It means that through small wearable devices it is possible to perform an electroencephalography (EEG), albeit with less potential than those offered by high-cost professional devices. Such devices make it possible for researchers a huge number of experiments that were once impossible in many areas due to the high costs of the necessary hardware. Many studies in the literature explore the use of EEG data as a biometric approach for people identification, but, unfortunately, it presents problems mainly related to the difficulty of extracting unique and stable patterns from users, despite the adoption of sophisticated techniques. An approach to face this problem is based on the evoked potentials (EPs), external stimuli applied during the EEG reading, a noninvasive technique used for many years in clinical routine, in combination with other diagnostic tests, to evaluate the electrical activity related to some areas of the brain and spinal cord to diagnose neurological disorders. In consideration of the growing number of works in the literature that combine the EEG and EP approaches for biometric purposes, this work aims to evaluate the practical feasibility of such approaches as reliable biometric instruments for user identification by surveying the state of the art of the last 6 years, also providing an overview of the elements and concepts related to this research area

    Hand-based multimodal identification system with secure biometric template storage

    Get PDF
    WOS:000304107200001This study proposes a biometric system for personal identification based on three biometric characteristics from the hand, namely: the palmprint, finger surfaces and hand geometry. A protection scheme is applied to the biometric template data to guarantee its revocability, security and diversity among different biometric systems. An error-correcting code (ECC), a cryptographic hash function (CHF) and a binarisation module are the core of the template protection scheme. Since the ECC and CHF operate on binary data, an additional feature binarisation step is required. This study proposes: (i) a novel identification architecture that uses hand geometry as a soft biometric to accelerate the identification process and ensure the system's scalability; and (ii) a new feature binarisation technique that guarantees that the Hamming distance between transformed binary features is proportional to the difference between their real values. The proposed system achieves promising recognition and speed performances on two publicly available hand image databases.info:eu-repo/semantics/acceptedVersio

    Automatic system for personal authentication using the retinal vessel tree as biometric pattern

    Get PDF
    [Resumen] La autenticación fiable de personas es un servicio cuya demanda aumenta en muchos campos, no sólo en entornos policiales o militares sino también en aplicaciones civiles tales como el control de acceso a zonas restringidas o la gestión de transacciones nancieras. Los sistemas de autenticación tradicionales están basados en el conocimiento (una palabra clave o un PIN ) o en la posesión (una tarjeta, o una llave). Dichos sistemas no son su cientemente ables en numerosos entornos, debido a su incapacidad común para diferenciar entre un usuario verdaderamente autorizado y otro que fraudulentamente haya adquirido el privilegio. Una solución para estos problemas se encuentra en las tecnologías de autenticación basadas en biometría. Un sistema biométrico es un sistema de reconocimiento de patrones que establece la autenticidad de los individuos caracterizándolos por medio de alguna característica física o de comportamiento. Existen muchas tecnologías de autenticación, algunas de ellas ya implementadas en paquetes comerciales. Las técnicas biométricas más comunes son la huella digital, probablemente la característica más antigua usada en biometría, iris, cara, geometría de la mano y, en cuanto a las características de comportamiento, reconocimiento de voz y rma. Hoy en día, la mayoría de los esfuerzos en los sistemas biométricos van encaminados al diseño de entornos más xi xii seguros donde sea más difícil, o virtualmente imposible, crear una copia de las propiedades utilizadas en el sistema para discriminar entre usuarios autorizados y no autorizados. En este contexto, el patrón de vasos sanguíneos en la retina se presenta como una característica biométrica relativamente joven pero muy interesante debido a sus propiedades inherentes. La más importante es que se trata de un patrón único para cada individuo. Además, al ser una característica interna es casi imposible crear una copia falsa. Por último, otra propiedad interesante es que el patrón no cambia signi cativamente a lo largo del tiempo excepto en casos de algunas patologías serias y no muy comunes. Por todo ello, el patrón de retina puede ser considerado un rasgo biométrico válido para la autenticación personal ya que es único, invariante en el tiempo y casi imposible de imitar. Por otra parte, el mayor incoveniente en el uso del patrón de vasos de la retina como característica biométrica radica en la etapa de adquisición todav ía percibida por el usuario como invasiva e incómoda. Hoy en día, existen mecanismos para obtener imágenes digitales de manera instantánea a través de cámaras no invasivas pero estos avances requieren a su vez una mayor tolerancia a variaciones en la calidad de la imagen adquirida y, por tanto, métodos computacionales más elaborados que sean capaces de procesar la información en entornos más heterogéneos. En esta tesis se presenta un nuevo sistema de autenticación automático usando el árbol retiniano como característica biométrica. El objetivo es diseñar y desarrollar un patrón biométrico robusto y compacto que sea fácilmente manejable y almacenable en dispositivos móviles de hoy en día como tarjetas con chip. La plantilla biométrica desarrollada a partir del árbol retiniano consiste en sus puntos característicos (bifurcaciones y cruces entre vasos) de forma que no sea necesario el almacenamiento y procesado de todo el árbol para realizar la autenticación
    • …
    corecore