369 research outputs found

    An enhanced iris recognition and authentication system using energy measure

    Get PDF
    In order to fight identity fraud, the use of a reliable personal identifier has become a necessity. Using Personal Identification Number (PIN) or a password is no longer secure enough to identify an individual. Iris recognition is considered to be one of the best and accurate form of biometric measurements compared to others, it has become an interesting research area. Iris recognition and authentication has a major issue in its code generation and verification accuracy, in order to enhance the authentication process, a binary bit sequence of iris is generated, which contain several vital information that is used to calculate the Mean Energy and Maximum Energy that goes into the eye with an adopted Threshold Value. The information generated can further be used to find out different eye ailments. An iris is obtained using a predefined iris image which is scanned through eight (8) different stages and wavelet packet decomposition is used to generate 64 wavelet packages bit iris code so as to match the iris codes with Hamming distance criteria and evaluate different energy values. The system showed 98% True Acceptance Rate and 1% False Rejection Rate and this is because some of the irises weren’t properly captured during iris acquisition phase. The system is implemented using UBIRIS v.1 Database.Keywords: Local Image Properties, Authentication Enhancement, Iris Authentication, Local Image, Iris Recognition, Binary Bit Sequenc

    Iris feature extraction: a survey

    Get PDF
    Biometric as a technology has been proved to be a reliable means of enforcing constraint in a security sensitiveenvironment. Among the biometric technologies, iris recognition system is highly accurate and reliable becauseof their stable characteristics throughout lifetime. Iris recognition is one of the biometric identification thatemploys pattern recognition technology with the use of high resolution camera. Iris recognition consist of manysections among which feature extraction is an important stage. Extraction of iris features is very important andmust be successfully carried out before iris signature is stored as a template. This paper gives a comprehensivereview of different fundamental iris feature extraction methods, and some other methods available in literatures.It also gives a summarised form of performance accuracy of available algorithms. This establishes a platform onwhich future research on iris feature extraction algorithm(s) as a component of iris recognition system can bebased.Keywords: biometric authentication, false acceptance rate (FAR), false rejection rate (FRR), feature extraction,iris recognition system

    Multi-modal association learning using spike-timing dependent plasticity (STDP)

    Get PDF
    We propose an associative learning model that can integrate facial images with speech signals to target a subject in a reinforcement learning (RL) paradigm. Through this approach, the rules of learning will involve associating paired stimuli (stimulus–stimulus, i.e., face–speech), which is also known as predictor-choice pairs. Prior to a learning simulation, we extract the features of the biometrics used in the study. For facial features, we experiment by using two approaches: principal component analysis (PCA)-based Eigenfaces and singular value decomposition (SVD). For speech features, we use wavelet packet decomposition (WPD). The experiments show that the PCA-based Eigenfaces feature extraction approach produces better results than SVD. We implement the proposed learning model by using the Spike- Timing-Dependent Plasticity (STDP) algorithm, which depends on the time and rate of pre-post synaptic spikes. The key contribution of our study is the implementation of learning rules via STDP and firing rate in spatiotemporal neural networks based on the Izhikevich spiking model. In our learning, we implement learning for response group association by following the reward-modulated STDP in terms of RL, wherein the firing rate of the response groups determines the reward that will be given. We perform a number of experiments that use existing face samples from the Olivetti Research Laboratory (ORL) dataset, and speech samples from TIDigits. After several experiments and simulations are performed to recognize a subject, the results show that the proposed learning model can associate the predictor (face) with the choice (speech) at optimum performance rates of 77.26% and 82.66% for training and testing, respectively. We also perform learning by using real data, that is, an experiment is conducted on a sample of face–speech data, which have been collected in a manner similar to that of the initial data. The performance results are 79.11% and 77.33% for training and testing, respectively. Based on these results, the proposed learning model can produce high learning performance in terms of combining heterogeneous data (face–speech). This finding opens possibilities to expand RL in the field of biometric authenticatio

    Fault diagnosis of rolling bearing based on relevance vector machine and kernel principal component analysis

    Get PDF
    In order to improve the speed and accuracy of rolling bearing fault diagnosis on small samples, a method based on relevance vector machine (RVM) and Kernel Principle Component Analysis (KPCA) is proposed. Firstly, the wavelet packet energy of the vibration signal is extracted with the wavelet packet transform, which is used as fault feature vectors. Secondly, the dimension of feature vectors is reduced in order to weaken the correlation between the features. The important principal components are selected using KPCA as the new feature vectors under the criterion that the cumulative variance is greater than 95 %. Finally, the faults of rolling bearing are diagnosed through combining KPCA with RVM. Simulation experimental indicates the advantages of the presented method. Moreover, the proposed approach is applied to diagnoses rolling bearing fault. The results show that wavelet packet energy can express rolling bearing fault features accurately, KPCA can reduce the dimension of feature vectors effectively and the proposed method has better performance in the speed of fault diagnosis than the method based on support vector machine (SVM), which supplies a strategy of fault diagnosis for rolling bearing. In this paper, the performance of the proposed method is also compared with other diagnostic methods

    Eye Detection Using Wavelets and ANN

    Get PDF
    A Biometric system provides perfect identification of individual based on a unique biological feature or characteristic possessed by a person such as finger print, hand writing, heart beat, face recognition and eye detection. Among them eye detection is a better approach since Human Eye does not change throughout the life of an individual. It is regarded as the most reliable and accurate biometric identification system available. In our project we are going to develop a system for ‘eye detection using wavelets and ANN’ with software simulation package such as matlab 7.0 tool box in order to verify the uniqueness of the human eyes and its performance as a biometric. Eye detection involves first extracting the eye from a digital face image, and then encoding the unique patterns of the eye in such a way that they can be compared with preregistered eye patterns. The eye detection system consists of an automatic segmentation system that is based on the wavelet transform, and then the Wavelet analysis is used as a pre-processor for a back propagation neural network with conjugate gradient learning. The inputs to the neural network are the wavelet maxima neighborhood coefficients of face images at a particular scale. The output of the neural network is the classification of the input into an eye or non-eye region. An accuracy of 81% is observed for test images under different environment conditions not included during training

    Wavelet–Based Face Recognition Schemes

    Get PDF

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims

    Speeded Up Robust Features Descriptor for Iris Recognition Systems

    Get PDF
    اكتسبت النظم البايومترية اهتماما كبيرا لعدة تطبيقات. كان تحديد القزحية أحد أكثر التقنيات البايومترية تطوراً للمصادقة الفعالة. نظام التعرف على القزحية الحالية يقدم نتائج دقيقة وموثوق بها على أساس الصور المأخوذة بالأشعة التحت الحمراء (NIR) عندما يتم التقاط الصور في مسافة ثابتة مع تعاون المستخدم. ولكن بالنسبة لصور العين الملونة التي تم الحصول عليها تحت الطول الموجي المرئي (VW) دون التعاون بين المستخدمين، فإن كفاءة التعرف على القزحية تتأثر بسبب الضوضاء مثل صور عدم وضوح العين، و تداخل الرموش ، والانسداد  بالأجفان وغيرها. يهدف هذا العمل إلى استخدام (SURF) لاسترداد خصائص القزحية في كل من صور قزحية NIR والطيف المرئي. يتم استخدام هذا النهج وتقييمه على قواعد بيانات CASIA v1and IITD v1 كصورة قزحية NIR وUBIRIS v1 كصورة ملونة. وأظهرت النتائج معدل دقة عالية (98.1 ٪) على CASIA v1, (98.2) على IITD v1 و (83٪) على UBIRIS v1 تقييمها بالمقارنة مع الأساليب الأخرى.Biometric systems have gained significant attention for several applications. Iris identification was one of the most sophisticated biometrical techniques for effective and confident authentication. Current iris identification system offers accurate and reliable results based on near- infra -red light (NIR) images when images are taken in a restricted area with fixed-distance user cooperation. However, for the color eye images obtained under visible wavelength (VW) without cooperation between the users, the efficiency of iris recognition degrades because of noise such as eye blurring images, eye lashing, occlusion and reflection. This works aims to use Speeded up robust features Descriptor (SURF) to retrieve the iris's characteristics in both NIR iris images and visible spectrum. This approach is used and evaluated on the CASIA v1and IITD v1 databases as NIR iris image and UBIRIS v1 as color image. The evaluation results showed a high accuracy rate 98.1 % on CASIA v1, 98.2 on IITD v1 and 83% on UBIRIS v1 evaluated by comparing to the other method
    corecore