1,001 research outputs found

    Pattern mining approaches used in sensor-based biometric recognition: a review

    Get PDF
    Sensing technologies place significant interest in the use of biometrics for the recognition and assessment of individuals. Pattern mining techniques have established a critical step in the progress of sensor-based biometric systems that are capable of perceiving, recognizing and computing sensor data, being a technology that searches for the high-level information about pattern recognition from low-level sensor readings in order to construct an artificial substitute for human recognition. The design of a successful sensor-based biometric recognition system needs to pay attention to the different issues involved in processing variable data being - acquisition of biometric data from a sensor, data pre-processing, feature extraction, recognition and/or classification, clustering and validation. A significant number of approaches from image processing, pattern identification and machine learning have been used to process sensor data. This paper aims to deliver a state-of-the-art summary and present strategies for utilizing the broadly utilized pattern mining methods in order to identify the challenges as well as future research directions of sensor-based biometric systems

    Identification and Security Implications of Biometrics

    Get PDF
    The usage of biometrics has become more frequent over the past couple of decades, notably due to technological advancements. Evolving technology in the field of biometrics has also led to increased accuracy of associated software, which have provided the opportunity to use a multitude of different human characteristics for identification and/or verification purposes. The current study assessed the usage of biometrics in casinos, hospitals, and law enforcement agencies using a survey methodology. Results indicated that privacy concerns related to the use of biometrics may not be as prevalent as indicated in the literature. Additionally, results indicated that the utilization of biometrics has led to increased accuracy in identification and verification processes, led to enhanced security, and would be highly recommended to other institutions. Information obtained from the literature notes the racial bias in facial recognition technologies due to algorithmic development based solely upon features of Caucasian individuals. Efforts need to be made to create facial recognition algorithms that are more racially and ethnically diverse

    Biometrics on mobile phone

    Get PDF

    Smart Brain Interaction Systems for Office Access and Control in Smart City Context

    Get PDF
    Over the past decade, the term “smart cities” has been worldwide priority for city planning by governments. Planning smart cities implies identifying key drivers for transforming into more convenient, comfortable, and safer life. This requires equipping the cities with appropriate smart technologies and infrastructure. Smart infrastructure is a key component in planning smart cities: smart places, transportation, health and education systems. Smart offices present the concept of workplaces that respond to user’s needs and allow less commitment to routine tasks. Smart offices solutions enable employees to change status of the surrounding environment upon the change of user’s preferences using the changes in the user’s biometrics measures. Meanwhile, smart office access and control through brain signals is quite recent concept. Hence, smart offices provide access and services availability at each moment using smart personal identification (PI) interfaces that responds only to the personal thoughts/preferences issued by the office employee not any other person. Hence, authentication and control systems could benefit from the biometrics. Yet these systems are facing efficiency and accessibility challenges in terms of unimodality. This chapter addresses those problems and proposes a prototype for multimodal biometric person identification control system for smart office access and control as a solution

    Privacy-Protecting Techniques for Behavioral Data: A Survey

    Get PDF
    Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions. Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques. We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations. Our analysis shows that some behavioral traits (e.g., voice) have received much attention, while others (e.g., eye-gaze, brainwaves) are mostly neglected. We also find that the evaluation methodology of behavioral anonymization techniques can be further improved

    Advanced Biometrics with Deep Learning

    Get PDF
    Biometrics, such as fingerprint, iris, face, hand print, hand vein, speech and gait recognition, etc., as a means of identity management have become commonplace nowadays for various applications. Biometric systems follow a typical pipeline, that is composed of separate preprocessing, feature extraction and classification. Deep learning as a data-driven representation learning approach has been shown to be a promising alternative to conventional data-agnostic and handcrafted pre-processing and feature extraction for biometric systems. Furthermore, deep learning offers an end-to-end learning paradigm to unify preprocessing, feature extraction, and recognition, based solely on biometric data. This Special Issue has collected 12 high-quality, state-of-the-art research papers that deal with challenging issues in advanced biometric systems based on deep learning. The 12 papers can be divided into 4 categories according to biometric modality; namely, face biometrics, medical electronic signals (EEG and ECG), voice print, and others

    Roadmap on signal processing for next generation measurement systems

    Get PDF
    Signal processing is a fundamental component of almost any sensor-enabled system, with a wide range of applications across different scientific disciplines. Time series data, images, and video sequences comprise representative forms of signals that can be enhanced and analysed for information extraction and quantification. The recent advances in artificial intelligence and machine learning are shifting the research attention towards intelligent, data-driven, signal processing. This roadmap presents a critical overview of the state-of-the-art methods and applications aiming to highlight future challenges and research opportunities towards next generation measurement systems. It covers a broad spectrum of topics ranging from basic to industrial research, organized in concise thematic sections that reflect the trends and the impacts of current and future developments per research field. Furthermore, it offers guidance to researchers and funding agencies in identifying new prospects.AerodynamicsMicrowave Sensing, Signals & System

    ПРОЕКТУВАННЯ СИСТЕМИ АВТЕНТИФІКАЦІЇ БІОМЕТРИЧНОГО ЗАХИСТУ НА ОСНОВІ МЕТОДУ K-СЕРЕДНІХ

    Get PDF
    The method of biometric identification, designed to ensure the protection of confidential information, is considered. The method of classification of biometric prints by means of machine learning is offered. One of the variants of the solution of the problem of identification of biometric images on the basis of the k-means algorithm is given. Marked data samples were created for learning and testing processes. Biometric fingerprint data were used to establish identity. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. Experimental results indicate that the k-means method is a promising approach to the classification of fingerprints. The development of biometrics leads to the creation of security systems with a better degree of recognition and with fewer errors than the security system on traditional media. Machine learning was performed using a number of samples from a known biometric database, and verification / testing was performed with samples from the same database that were not included in the training data set. Biometric fingerprint data based on the freely available NIST Special Database 302 were used to establish identity, and the learning outcomes were shown. A new fingerprint scan that belongs to a particular person is compared to the data stored for that person. If the measurements match, the statement that the person has been identified is true. The machine learning system is built on a modular basis, by forming combinations of individual modules scikit-learn library in a python environment.Розглянуто метод біометричної ідентифікації, призначений для забезпечення захисту конфіденційної інформації. Запропоновано метод класифікації біометричних відбитків за допомогою машинного навчання. Подано один із варіантів розв’язку задачі ідентифікації біометричних зображень на основі алгоритму к-середніх. Було створено позначені зразки даних для процесів навчання та тестування. Для встановлення особистості використовувались біометричні дані відбитків пальців. Нове сканування відбитків пальців, яке належить певній особі, порівнюється з даними, що зберігаються для цієї особи. Якщо вимірювання збігаються, твердження про те, що особа пройшла ідентифікацію, відповідає дійсності. Експериментальні результати вказують, що метод k-середніх є перспективним підходом до класифікації відбитків пальців. Розвиток біометрії призводить до створення систем безпеки з кращим ступенем розпізнавання і з меншою кількістю помилок, ніж система безпеки на традиційних носіях інформації. Машинне навчання проводили з використанням ряду зразків із відомої біометричної бази даних, а перевірку / тестування проводили із зразками з тієї самої бази даних, які не були включені до набору навчальних даних. Для встановлення особистості використовувались біометричні дані відбитків пальців на основі вільдоступної бази NIST Special Database 302, та показано результати навчання. Нове сканування відбитків пальців, яке належить певній особі, порівнюється з даними, що зберігаються для цієї особи. Якщо вимірювання збігаються, твердження про те, що особа пройшла ідентифікацію, відповідає дійсності. Система машинного навчання побудована на модульній основі, шляхом формування комбінацій окремих модулів бібліотека scikit-learn у середовищі python
    corecore