10,637 research outputs found

    Artificial Intelligence in Biometrics and Face Detection

    Get PDF
    In 1956 John McCarthy first coined the term Artificial Intelligence, he defined it as “the science and engineering of making intelligent machines”, and development of computer systems able to perform tasks normally requiring human Intelligence. Biometrics is a technical term for measurements and calculations, it refers to metrics related to human characteristics. With the wide spread of AI touching every possible field, advancements in the field of Biometrics has come a long way. In this paper we aim at introducing the readers to the basic principles of AI in Biometrics, performance of Biometric Systems in terms of false match rate (FMR), failure to enroll rate (FER), equal error rate (ERR), which have reduced extensively after the use of AI. Its application in the banking industry, explaining the use of Iris Recognition, for easier and safer withdrawal of money, in National Security in terms of Skynet: China’s best Surveillance System, which uses Face Recognition technology to its full potential. After describing the applications, we define Biometrics of Intent, which surpasses the traditional scope and ambition of this Technology, a new era of Biometrics, one where cognitive sciences and neurobehavioral insights such as heart rates, breathing, eye movement, will be integrated into screening process, which help identify potentially dangerous individuals

    Modelling and simulation of a biometric identity-based cryptography

    Get PDF
    Government information is a vital asset that must be kept in a trusted environment and efficiently managed by authorised parties. Even though e-Government provides a number of advantages, it also introduces a range of new security risks. Sharing confidential and top-secret information in a secure manner among government sectors tend to be the main element that government agencies look for. Thus, developing an effective methodology is essential and it is a key factor for e-Government success. The proposed e-Government scheme in this paper is a combination of identity-based encryption and biometric technology. This new scheme can effectively improve the security in authentication systems, which provides a reliable identity with a high degree of assurance. In addition, this paper demonstrates the feasibility of using Finite-state machines as a formal method to analyse the proposed protocols

    Using biometrics authentication via fingerprint recognition in e-Exams in e-Learning environment

    No full text
    E-learning is a great opportunity for modern life. Notably, however, the tool needs to be coupled with efficient and reliable security mechanisms to ensure the medium can be established as a dependable one. Authentication of e-exam takers is of prime importance so that exams are given by fair means. A new approach shall be proposed so as to ensure that no unauthorised individuals are permitted to give the exams

    Transparent authentication: Utilising heart rate for user authentication

    Get PDF
    There has been exponential growth in the use of wearable technologies in the last decade with smart watches having a large share of the market. Smart watches were primarily used for health and fitness purposes but recent years have seen a rise in their deployment in other areas. Recent smart watches are fitted with sensors with enhanced functionality and capabilities. For example, some function as standalone device with the ability to create activity logs and transmit data to a secondary device. The capability has contributed to their increased usage in recent years with researchers focusing on their potential. This paper explores the ability to extract physiological data from smart watch technology to achieve user authentication. The approach is suitable not only because of the capacity for data capture but also easy connectivity with other devices - principally the Smartphone. For the purpose of this study, heart rate data is captured and extracted from 30 subjects continually over an hour. While security is the ultimate goal, usability should also be key consideration. Most bioelectrical signals like heart rate are non-stationary time-dependent signals therefore Discrete Wavelet Transform (DWT) is employed. DWT decomposes the bioelectrical signal into n level sub-bands of detail coefficients and approximation coefficients. Biorthogonal Wavelet (bior 4.4) is applied to extract features from the four levels of detail coefficents. Ten statistical features are extracted from each level of the coffecient sub-band. Classification of each sub-band levels are done using a Feedforward neural Network (FF-NN). The 1 st , 2 nd , 3 rd and 4 th levels had an Equal Error Rate (EER) of 17.20%, 18.17%, 20.93% and 21.83% respectively. To improve the EER, fusion of the four level sub-band is applied at the feature level. The proposed fusion showed an improved result over the initial result with an EER of 11.25% As a one-off authentication decision, an 11% EER is not ideal, its use on a continuous basis makes this more than feasible in practice

    Development of CUiris: A Dark-Skinned African Iris Dataset for Enhancement of Image Analysis and Robust Personal Recognition

    Get PDF
    Iris recognition algorithms, especially with the emergence of large-scale iris-based identification systems, must be tested for speed and accuracy and evaluated with a wide range of templates – large size, long-range, visible and different origins. This paper presents the acquisition of eye-iris images of dark-skinned subjects in Africa, a predominant case of verydark- brown iris images, under near-infrared illumination. The peculiarity of these iris images is highlighted from the histogram and normal probability distribution of their grayscale image entropy (GiE) values, in comparison to Asian and Caucasian iris images. The acquisition of eye-images for the African iris dataset is ongoing and will be made publiclyavailable as soon as it is sufficiently populated
    • …
    corecore