211 research outputs found

    Developing a New Algorithm to Detect Right Thumb Fingernail in Healthy Human

    Get PDF
    Due to significant challenges faced by traditional methods of personal identification like fingerprinting, eye scanning, and voice recognition, new techniques are needed. One such approach involves the use of human nail images for identification and access to personal identification programs and electronic patient files. A novel algorithm, which consists of three stages, has been proposed utilizing the HSV color space detection algorithm, grayscale contrast optimization algorithm, nail segmentation, and image smoothing with a Gaussian filter. This method reduces tested image data and preserves the primary image structure, and has the potential to surpass the accuracy of traditional methods, providing an additional layer of security in personal identification programs and electronic patient files. Nail image detection can be conducted remotely and accessed through standard cameras or smartphones, making it a more hygienic and convenient option than physical contact methods such as fingerprinting or eye scanning. Moreover, the use of nail images for personal identification has several other benefits, especially in situations where traditional methods are not feasible, such as in individuals with skin conditions that prevent fingerprinting. The success of the proposed algorithm in detecting nail images for personal identification has implications beyond individual security and can be applied in different fields, including healthcare and forensic science, to improve identification accuracy and prevent fraud. For example, the use of nail images could help prevent identity theft in healthcare settings, where sensitive information is stored and exchanged

    Utilization of 3D sensors in biometry

    Get PDF
    The begin of this article is about biometric systems. Where writers tried to describe the basic division of Biometric systems. Following part of article will be focused on sensors issues. Where are given simple labels of scanners and 3D scanners. The next part of this article showing description of scanner usage in biometric systems (face identification, finger print, etc…). This article is focused on understanding of biometric scanning. © 2016 Research India Publications

    An overview of touchless 2D fingerprint recognition

    Get PDF
    Touchless fingerprint recognition represents a rapidly growing field of research which has been studied for more than a decade. Through a touchless acquisition process, many issues of touch-based systems are circumvented, e.g., the presence of latent fingerprints or distortions caused by pressing fingers on a sensor surface. However, touchless fingerprint recognition systems reveal new challenges. In particular, a reliable detection and focusing of a presented finger as well as an appropriate preprocessing of the acquired finger image represent the most crucial tasks. Also, further issues, e.g., interoperability between touchless and touch-based fingerprints or presentation attack detection, are currently investigated by different research groups. Many works have been proposed so far to put touchless fingerprint recognition into practice. Published approaches range from self identification scenarios with commodity devices, e.g., smartphones, to high performance on-the-move deployments paving the way for new fingerprint recognition application scenarios.This work summarizes the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process. Additionally, technical considerations and trade-offs of the presented methods are discussed along with open issues and challenges. An overview of available research resources completes the work

    Generating and analyzing synthetic finger vein images

    Get PDF
    Abstract: The finger-vein biometric offers higher degree of security, personal privacy and strong anti-spoofing capabilities than most other biometric modalities employed today. Emerging privacy concerns with the database acquisition and lack of availability of large scale finger-vein database have posed challenges in exploring this technology for large scale applications. This paper details the first such attempt to synthesize finger-vein images and presents analysis of synthesized images for the biometrics authentication. We generate a database of 50,000 finger vein images, corresponding to 5000 different subjects, with 10 different synthesized finger-vein images from each of the subject. We use tractable probability models to compare synthesized finger-vein images with the real finger- vein images for their image variability. This paper also presents matching accuracy using the synthesized finger-vein database from 5000 different subjects, using 225000 genuine and 1249750000 impostor matching scores, which suggests significant promises from this finger-vein biometric modality for large scale biometrics applications

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    Liveness Detection in Biometrics

    Get PDF

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers
    corecore