554 research outputs found

    Vein Pattern Extraction Using Near Infrared Imaging for Biometric Purposes

    Get PDF
    Biomedical verification has been broadly examined for many years and pulled in much consideration because of its huge potential security application. Vein is less prone to damage and almost improbable to copy than any other physiological as well as behavioural biometric features such as fingerprint, iris, face and voice recognition. This paper proposes an efficient vein extraction method on low quality vein images taken by a camera absorbing near infrared light (NIR camera). At first, the image is contrast enhanced using contrast limited adaptive histogram equalization (CLAHE); secondly, local threshold method is applied on small blocks of the image followed by several morphological operations such as fill, erosion, dilation, clean and bridge, performed sequentially, for better accuracy. Experimental results obtained for extraction show that the proposed method can reap better results with reduced complexity. After extraction, matching of the test image with the template images stored in the database are matched using minutiae (point-to-point pattern). An orientation detector which filters out missing or unnecessary or unnatural spurious minutiae pairings while simultaneously using path or ridge orientations to increase performance and similarity score calculation. Thus the obtained processed images can be used in biometric purposes which in turn enhances the security of the syste

    A Survey of Biometric Recognition Systems in E-Business Transactions

    Get PDF
    The global expansion of e-business applications has introduced novel challenges, with an escalating number of security issues linked to online transactions, such as phishing attacks and identity theft. E-business involves conducting buying and selling activities online, facilitated by the Internet. The application of biometrics has been proposed as a solution to mitigate security concerns in e- business transactions. Biometric recognition involves the use of automated techniques to validate an individual's identity based on both physiological and behavioural characteristics. This research focuses specifically on implementing a multimodal biometric recognition system that incorporates face and fingerprint data to enhance the security of e-business transactions. In contrast to unimodal systems relying on a single biometric modality, this approach addresses limitations such as noise, universality, and variations in both interclass and intraclass scenarios. The study emphasizes the advantages of multimodal biometric systems while shedding light on vulnerabilities in biometrics within the e- business context. This in-depth analysis serves as a valuable resource for those exploring the intersection of e-business and biometrics, providing insights into the strengths, challenges, and best practices for stakeholders in this domain. Finally, the paper concludes with a summary and outlines potential avenues for future research

    A survey of wearable biometric recognition systems

    Get PDF
    The growing popularity of wearable devices is leading to new ways to interact with the environment, with other smart devices, and with other people. Wearables equipped with an array of sensors are able to capture the owner's physiological and behavioural traits, thus are well suited for biometric authentication to control other devices or access digital services. However, wearable biometrics have substantial differences from traditional biometrics for computer systems, such as fingerprints, eye features, or voice. In this article, we discuss these differences and analyse how researchers are approaching the wearable biometrics field. We review and provide a categorization of wearable sensors useful for capturing biometric signals. We analyse the computational cost of the different signal processing techniques, an important practical factor in constrained devices such as wearables. Finally, we review and classify the most recent proposals in the field of wearable biometrics in terms of the structure of the biometric system proposed, their experimental setup, and their results. We also present a critique of experimental issues such as evaluation and feasibility aspects, and offer some final thoughts on research directions that need attention in future work.This work was partially supported by the MINECO grant TIN2013-46469-R (SPINY) and the CAM Grant S2013/ICE-3095 (CIBERDINE

    An Efficient Reconfigurable Architecture for Fingerprint Recognition

    Get PDF
    The fingerprint identification is an efficient biometric technique to authenticate human beings in real-time Big Data Analytics. In this paper, we propose an efficient Finite State Machine (FSM) based reconfigurable architecture for fingerprint recognition. The fingerprint image is resized, and Compound Linear Binary Pattern (CLBP) is applied on fingerprint, followed by histogram to obtain histogram CLBP features. Discrete Wavelet Transform (DWT) Level 2 features are obtained by the same methodology. The novel matching score of CLBP is computed using histogram CLBP features of test image and fingerprint images in the database. Similarly, the DWT matching score is computed using DWT features of test image and fingerprint images in the database. Further, the matching scores of CLBP and DWT are fused with arithmetic equation using improvement factor. The performance parameters such as TSR (Total Success Rate), FAR (False Acceptance Rate), and FRR (False Rejection Rate) are computed using fusion scores with correlation matching technique for FVC2004 DB3 Database. The proposed fusion based VLSI architecture is synthesized on Virtex xc5vlx30T-3 FPGA board using Finite State Machine resulting in optimized parameters

    Face Liveness Detection under Processed Image Attacks

    Get PDF
    Face recognition is a mature and reliable technology for identifying people. Due to high-definition cameras and supporting devices, it is considered the fastest and the least intrusive biometric recognition modality. Nevertheless, effective spoofing attempts on face recognition systems were found to be possible. As a result, various anti-spoofing algorithms were developed to counteract these attacks. They are commonly referred in the literature a liveness detection tests. In this research we highlight the effectiveness of some simple, direct spoofing attacks, and test one of the current robust liveness detection algorithms, i.e. the logistic regression based face liveness detection from a single image, proposed by the Tan et al. in 2010, against malicious attacks using processed imposter images. In particular, we study experimentally the effect of common image processing operations such as sharpening and smoothing, as well as corruption with salt and pepper noise, on the face liveness detection algorithm, and we find that it is especially vulnerable against spoofing attempts using processed imposter images. We design and present a new facial database, the Durham Face Database, which is the first, to the best of our knowledge, to have client, imposter as well as processed imposter images. Finally, we evaluate our claim on the effectiveness of proposed imposter image attacks using transfer learning on Convolutional Neural Networks. We verify that such attacks are more difficult to detect even when using high-end, expensive machine learning techniques

    Improving web authentication with keystroke dynamics

    Get PDF
    Dissertação de mestrado em Engenharia InformáticaAuthentication is frequently referred as the most critical part of a computer system security. Users commonly identify themselves using a combination of username and password, but sometimes this is not enough. Concerning web-based services, attacks like phishing or social engineering can easily result in identity theft. In addition, the widespread use of single sign-on services can seriously increase the consequences of such attacks. In these circumstances strong authentication is mandatory. Strong authentication is often implemented using additional authentication steps or specialized hardware modules, which is not suitable for web-based systems. However, biometrics can used to overcome these limitations. More specifically, behavioural biometrics based on keyboard typing patterns can provide an extra security layer on top of conventional authentication methods, with no additional cost and no impact to the user experience. This work aims to evaluate the feasibility of the implementation of strong authentication on the web using keystroke dynamics. This is carried out through the creation of a web-application prototype, collection of a keystroke dynamics dataset and analysis of various matching algorithms and performance metrics on the collected data.O processo de autenticação é frequentemente referido como a parte mais importante da segurança de um sistema informático. Normalmente, os utilizadores identificam-se utilizando nome de utilizador e palavra-passe, mas este mecanismo nem sempre é suficiente. Considerando serviços baseados na web, ataques como phishing ou engenharia social podem facilmente levar ao roubo de identidade. Para além disso, a utilização crescente de serviços de single sign-on apresenta novos riscos e consequências deste tipo de ataques. Nestas circunstâncias a autenticação forte é fundamental. A autenticação forte é tipicamente implementada por meio de passos adicionais de autenticação ou módulos de hardware especializado, o que não é adequado a sistemas baseados na web. No entanto, biometrias podem ser usadas para ultrapassar estas limitações. Mais especificamente, biometrias comportamentais baseadas em padrões de digitação no teclado podem fornecer um nível de segurança adicional, sem custo acrescido ou impacto na experiência de utilização. Este trabalho tem como objetivo avaliar a viabilidade da implementação de autenticação forte na web usando dinâmica de digitação. Isto é conseguido através da implementação de um protótipo sob a forma de uma aplicação web, captura de dados de digitação e análise de vários algoritmos e métricas de desempenho sobre os dados recolhidos

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Transparent Authentication Utilising Gait Recognition

    Get PDF
    Securing smartphones has increasingly become inevitable due to their massive popularity and significant storage and access to sensitive information. The gatekeeper of securing the device is authenticating the user. Amongst the many solutions proposed, gait recognition has been suggested to provide a reliable yet non-intrusive authentication approach – enabling both security and usability. While several studies exploring mobile-based gait recognition have taken place, studies have been mainly preliminary, with various methodological restrictions that have limited the number of participants, samples, and type of features; in addition, prior studies have depended on limited datasets, actual controlled experimental environments, and many activities. They suffered from the absence of real-world datasets, which lead to verify individuals incorrectly. This thesis has sought to overcome these weaknesses and provide, a comprehensive evaluation, including an analysis of smartphone-based motion sensors (accelerometer and gyroscope), understanding the variability of feature vectors during differing activities across a multi-day collection involving 60 participants. This framed into two experiments involving five types of activities: standard, fast, with a bag, downstairs, and upstairs walking. The first experiment explores the classification performance in order to understand whether a single classifier or multi-algorithmic approach would provide a better level of performance. The second experiment investigated the feature vector (comprising of a possible 304 unique features) to understand how its composition affects performance and for a comparison a more particular set of the minimal features are involved. The controlled dataset achieved performance exceeded the prior work using same and cross day methodologies (e.g., for the regular walk activity, the best results EER of 0.70% and EER of 6.30% for the same and cross day scenarios respectively). Moreover, multi-algorithmic approach achieved significant improvement over the single classifier approach and thus a more practical approach to managing the problem of feature vector variability. An Activity recognition model was applied to the real-life gait dataset containing a more significant number of gait samples employed from 44 users (7-10 days for each user). A human physical motion activity identification modelling was built to classify a given individual's activity signal into a predefined class belongs to. As such, the thesis implemented a novel real-world gait recognition system that recognises the subject utilising smartphone-based real-world dataset. It also investigates whether these authentication technologies can recognise the genuine user and rejecting an imposter. Real dataset experiment results are offered a promising level of security particularly when the majority voting techniques were applied. As well as, the proposed multi-algorithmic approach seems to be more reliable and tends to perform relatively well in practice on real live user data, an improved model employing multi-activity regarding the security and transparency of the system within a smartphone. Overall, results from the experimentation have shown an EER of 7.45% for a single classifier (All activities dataset). The multi-algorithmic approach achieved EERs of 5.31%, 6.43% and 5.87% for normal, fast and normal and fast walk respectively using both accelerometer and gyroscope-based features – showing a significant improvement over the single classifier approach. Ultimately, the evaluation of the smartphone-based, gait authentication system over a long period of time under realistic scenarios has revealed that it could provide a secured and appropriate activities identification and user authentication system
    corecore