31 research outputs found

    A Review: Person Identification using Retinal Fundus Images

    Get PDF
    In this paper a review on biometric person identification has been discussed using features from retinal fundus image. Retina recognition is claimed to be the best person identification method among the biometric recognition systems as the retina is practically impossible to forge. It is found to be most stable, reliable and most secure among all other biometric systems. Retina inherits the property of uniqueness and stability. The features used in the recognition process are either blood vessel features or non-blood vessel features. But the vascular pattern is the most prominent feature utilized by most of the researchers for retina based person identification. Processes involved in this authentication system include pre-processing, feature extraction and feature matching. Bifurcation and crossover points are widely used features among the blood vessel features. Non-blood vessel features include luminance, contrast, and corner points etc. This paper summarizes and compares the different retina based authentication system. Researchers have used publicly available databases such as DRIVE, STARE, VARIA, RIDB, ARIA, AFIO, DRIDB, and SiMES for testing their methods. Various quantitative measures such as accuracy, recognition rate, false rejection rate, false acceptance rate, and equal error rate are used to evaluate the performance of different algorithms. DRIVE database provides 100\% recognition for most of the methods. Rest of the database the accuracy of recognition is more than 90\%

    Process of Fingerprint Authentication using Cancelable Biohashed Template

    Get PDF
    Template protection using cancelable biometrics prevents data loss and hacking stored templates, by providing considerable privacy and security. Hashing and salting techniques are used to build resilient systems. Salted password method is employed to protect passwords against different types of attacks namely brute-force attack, dictionary attack, rainbow table attacks. Salting claims that random data can be added to input of hash function to ensure unique output. Hashing salts are speed bumps in an attacker’s road to breach user’s data. Research proposes a contemporary two factor authenticator called Biohashing. Biohashing procedure is implemented by recapitulated inner product over a pseudo random number generator key, as well as fingerprint features that are a network of minutiae. Cancelable template authentication used in fingerprint-based sales counter accelerates payment process. Fingerhash is code produced after applying biohashing on fingerprint. Fingerhash is a binary string procured by choosing individual bit of sign depending on a preset threshold. Experiment is carried using benchmark FVC 2002 DB1 dataset. Authentication accuracy is found to be nearly 97\%. Results compared with state-of art approaches finds promising

    Retinal blood vessel segmentation: methods and implementations

    Get PDF
    Since the retinal blood vessel has been acknowledged as an indispensable element in both ophthalmological and cardiovascular disease diagnosis, the accurate segmentation of the retinal vessel tree has become the prerequisite step for automatic or computer-aided diagnosis systems. This thesis, therefore, has investigated different works of image segmentation algorithms and techniques, including unsupervised and supervised methods. Further, the thesis has developed and implemented two systems of the accurate retinal vessel segmentation. The methodologies explained and analyzed in this thesis, have been selected as the most efficient approaches to achieve higher precision, better robustness, and faster execution speed, to meet the strict standard of the modern medical imaging. Based on the intensive investigation and experiments, this thesis has proposed two outstanding implementations of the retinal blood vessel segmentation. The first implementation focuses on the fast, accurate and robust extraction of the retinal vessels using unsupervised techniques, by applying morphology-based global thresholding to draw the retinal venule structure and centerline detection to extract the capillaries. Besides, this system has been designed to minimize the computing complexity and to process multiple independent procedures in parallel. The second proposed system has especially focused on robustness and accuracy in regardless of execution time. This method has utilized the full convolutional neural network trained from a pre-trained semantic segmentation model, which is also called the transfer deep learning. This proposed method has simplified the typical retinal vessel segmentation problem from full-size image segmentation to regional vessel element recognition. Both of the implementations have outperformed their related works and have presented a remarkable scientific value for future computer-aided diagnosis applications. What’s more, this thesis is also a research guide which provide readers with the comprehensive knowledge on how to research on the task of retinal vessel segmentation

    Handbook of Vascular Biometrics

    Get PDF

    Retinal blood vessel segmentation: methods and implementations

    Get PDF
    Since the retinal blood vessel has been acknowledged as an indispensable element in both ophthalmological and cardiovascular disease diagnosis, the accurate segmentation of the retinal vessel tree has become the prerequisite step for automatic or computer-aided diagnosis systems. This thesis, therefore, has investigated different works of image segmentation algorithms and techniques, including unsupervised and supervised methods. Further, the thesis has developed and implemented two systems of the accurate retinal vessel segmentation. The methodologies explained and analyzed in this thesis, have been selected as the most efficient approaches to achieve higher precision, better robustness, and faster execution speed, to meet the strict standard of the modern medical imaging. Based on the intensive investigation and experiments, this thesis has proposed two outstanding implementations of the retinal blood vessel segmentation. The first implementation focuses on the fast, accurate and robust extraction of the retinal vessels using unsupervised techniques, by applying morphology-based global thresholding to draw the retinal venule structure and centerline detection to extract the capillaries. Besides, this system has been designed to minimize the computing complexity and to process multiple independent procedures in parallel. The second proposed system has especially focused on robustness and accuracy in regardless of execution time. This method has utilized the full convolutional neural network trained from a pre-trained semantic segmentation model, which is also called the transfer deep learning. This proposed method has simplified the typical retinal vessel segmentation problem from full-size image segmentation to regional vessel element recognition. Both of the implementations have outperformed their related works and have presented a remarkable scientific value for future computer-aided diagnosis applications. What’s more, this thesis is also a research guide which provide readers with the comprehensive knowledge on how to research on the task of retinal vessel segmentation

    Retinal blood vessel segmentation: methods and implementations

    Get PDF
    Since the retinal blood vessel has been acknowledged as an indispensable element in both ophthalmological and cardiovascular disease diagnosis, the accurate segmentation of the retinal vessel tree has become the prerequisite step for automatic or computer-aided diagnosis systems. This thesis, therefore, has investigated different works of image segmentation algorithms and techniques, including unsupervised and supervised methods. Further, the thesis has developed and implemented two systems of the accurate retinal vessel segmentation. The methodologies explained and analyzed in this thesis, have been selected as the most efficient approaches to achieve higher precision, better robustness, and faster execution speed, to meet the strict standard of the modern medical imaging. Based on the intensive investigation and experiments, this thesis has proposed two outstanding implementations of the retinal blood vessel segmentation. The first implementation focuses on the fast, accurate and robust extraction of the retinal vessels using unsupervised techniques, by applying morphology-based global thresholding to draw the retinal venule structure and centerline detection to extract the capillaries. Besides, this system has been designed to minimize the computing complexity and to process multiple independent procedures in parallel. The second proposed system has especially focused on robustness and accuracy in regardless of execution time. This method has utilized the full convolutional neural network trained from a pre-trained semantic segmentation model, which is also called the transfer deep learning. This proposed method has simplified the typical retinal vessel segmentation problem from full-size image segmentation to regional vessel element recognition. Both of the implementations have outperformed their related works and have presented a remarkable scientific value for future computer-aided diagnosis applications. What’s more, this thesis is also a research guide which provide readers with the comprehensive knowledge on how to research on the task of retinal vessel segmentation

    Comparative analysis of hashing schemes for Iris identification using local features

    Get PDF
    Iris is one of the most reliable biometric trait due to its stability and randomness. Traditional recognition systems transform the iris to polar coordinates and perform well for co-operative databases. However, the problem aggravates to manifold for recognizing non-cooperative irises. In addition, the transformation of iris to polar domain introduces aliasing eect. In this thesis, Noise Independent Annular Iris is used for feature extraction. Global feature extraction approaches are rendered as unsuitable for annular iris due to change in scale as they could not achieve invariance to transformation and illumination. On the contrary, local features are invariant to image scaling, rotation, and partially invariant to change in illumination and viewpoint. To extract local features, Scale Invariant Feature Transform (SIFT) has been applied to annular iris. However, SIFT is computationally expensive for recognition due to higher dimensional descriptor. Thus, a keypoint descriptor called Speeded Up Robust Features (SURF) is applied to mark performance improvement in terms of time as well as accuracy. At last, a recently developed Binary Robust Invariant Scalable Keypoints (BRISK) is applied. BRISK performs at a dramatically lower computational cost than SIFT and SURF. For identication, retrieval time plays a signicant role in addition to accuracy. Traditional indexing approaches cannot be applied to biometrics as data are un- structured. In this thesis, two novel approaches has been applied for indexing iris database. In the rst approach, indexing is done using Geometric Hashing of local feature keypoints. This approach achieves invariance to similarity transformations, illumination, and occlusion and performs with a good accuracy for cooperative as well as non-cooperative databases, but it takes larger time for recognition. In the second approach, enhanced geometric hashing is applied using local keypoint descrip- tors of annular iris for dierent databases. Comparative analysis shows that enhanced geometric hashing is more accurate and faster than traditional geometric hashing

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    Design of Speaker Verification using Dynamic Time Warping (DTW) on Graphical Programming for Authentication Process

    Get PDF
    Authentication is generally required on systems which need safety and privacy. In common, typed username and password are used and applied in authentication system. However, this type of authentication has been identified to have many weaknesses. In order to overcome the problem, many proposed authentication system based on voice as unique characteristics of human. We implement Dynamic Time Warping algorithm to compare human voice with reference voice as the authentication process. The testing results show that the system accuracy of the speech recognition average is 86.785%
    corecore