62 research outputs found

    LivDet in Action - Fingerprint Liveness Detection Competition 2019

    Full text link
    The International Fingerprint liveness Detection Competition (LivDet) is an open and well-acknowledged meeting point of academies and private companies that deal with the problem of distinguishing images coming from reproductions of fingerprints made of artificial materials and images relative to real fingerprints. In this edition of LivDet we invited the competitors to propose integrated algorithms with matching systems. The goal was to investigate at which extent this integration impact on the whole performance. Twelve algorithms were submitted to the competition, eight of which worked on integrated systems.Comment: Preprint version of a paper accepted at ICB 201

    A Biometric Fusion Based on Face and Fingerprint Recognition using ANN

    Get PDF
    Biometric systems are used for identifying and recognizing individual characteristics on the basis of biological or behavioral features. In the research work, a biometric fusion system based on fingerprint and face using the artificial intelligence technique is proposed. To achieve better accuracy of the biometric fusion system, the uniqueness of feature is significant. To find out the unique feature set from the data, we have used different feature extraction algorithm in the proposed biometric fusion system. Initially, pre-processing has been applied on the test images which is used to remove the unwanted data from the uploaded image and return an appropriate data for further process. In the fingerprint part, minutia extraction is used as a feature of fingerprint whereas Extended Local Binary pattern (ELBP) is used for extracting features of face and creates a pattern of face features. To create a unique feature set, optimization algorithm is needed and we have used genetic algorithm as a feature optimization technique. In the proposed fusion system, ANN is used to classify the test data according to the trained ANN structure with optimized feature data of fingerprint and face. To check the efficiency of proposed fusion system, we have calculated the performance parameters like FAR, FRR and Accuracy. From the analysis of proposed fusion system, we have observed that the accuracy of the proposed work is better than the previous ones and it is more than the 94%. To design a proposed biometric fusion system, image processing toolbox is used under the MATLAB environment

    Presentation Attack detection using Wavelet Transform and Deep Residual Neural Net

    Full text link
    Biometric authentication is becoming more prevalent for secured authentication systems. However, the biometric substances can be deceived by the imposters in several ways. Among other imposter attacks, print attacks, mask attacks, and replay attacks fall under the presentation attack category. The bio-metric images, especially the iris and face, are vulnerable to different presentation attacks. This research applies deep learning approaches to mitigate presentation attacks in a biometric access control system. Our contribution in this paper is two-fold: First, we applied the wavelet transform to extract the features from the biometric images. Second, we modified the deep residual neural net and applied it to the spoof datasets in an attempt to detect the presentation attacks. This research applied the proposed approach to biometric spoof datasets, namely ATVS, CASIA two class, and CASIA cropped image sets. The datasets used in this research contain images that are captured in both a controlled and uncontrolled environment along with different resolutions and sizes. We obtained the best accuracy of 93% on the ATVS Iris datasets. For CASIA two class and CASIA cropped datasets, we achieved test accuracies of 91% and 82%, respectively

    Recognising people using smart phone antennas: A fuzzy biometric

    Get PDF
    Many calls are made to mobile phones by machines and for nuisance avoidance it would be useful to know if the caller was human or not. Also for convenience it would also be useful to know if the person using a mobile was the same as the one normally using it and if that person was an adult or a child. A wrong result could be used to trigger a request for a key code. Using the hand and four mobile frequency band antennas this paper has investigated the effects of different people on the input impedance of mobile phone antennas with the aim of establishing whether the effect is distinct enough to allow a fuzzy biometric to be achieved. Hands were placed at a range of distances from the antenna, using a test rig designed specifically for this experiment. The frequencies of operation were 900 MHz, 1800 MHz, 1900 MHz and 2.4 GHz. Results showed that the effect of each volunteer on the antenna's input impedance varied significantly when their hand was 30 mm or less from the antenna and that below 10mm they were distinct between volunteers

    Feature Representation for Online Signature Verification

    Full text link
    Biometrics systems have been used in a wide range of applications and have improved people authentication. Signature verification is one of the most common biometric methods with techniques that employ various specifications of a signature. Recently, deep learning has achieved great success in many fields, such as image, sounds and text processing. In this paper, deep learning method has been used for feature extraction and feature selection.Comment: 10 pages, 10 figures, Submitted to IEEE Transactions on Information Forensics and Securit
    • …
    corecore