51 research outputs found

    An overview of touchless 2D fingerprint recognition

    Get PDF
    Touchless fingerprint recognition represents a rapidly growing field of research which has been studied for more than a decade. Through a touchless acquisition process, many issues of touch-based systems are circumvented, e.g., the presence of latent fingerprints or distortions caused by pressing fingers on a sensor surface. However, touchless fingerprint recognition systems reveal new challenges. In particular, a reliable detection and focusing of a presented finger as well as an appropriate preprocessing of the acquired finger image represent the most crucial tasks. Also, further issues, e.g., interoperability between touchless and touch-based fingerprints or presentation attack detection, are currently investigated by different research groups. Many works have been proposed so far to put touchless fingerprint recognition into practice. Published approaches range from self identification scenarios with commodity devices, e.g., smartphones, to high performance on-the-move deployments paving the way for new fingerprint recognition application scenarios.This work summarizes the state-of-the-art in the field of touchless 2D fingerprint recognition at each stage of the recognition process. Additionally, technical considerations and trade-offs of the presented methods are discussed along with open issues and challenges. An overview of available research resources completes the work

    Image Sharpness-Based System Design for Touchless Palmprint Recognition

    Get PDF
    Currently, many palmprint acquisition devices have been proposed, but how to design the systems are seldom studied, such as how to choose the imaging sensor, the lens, and the working distance. This chapter aims to find the relationship between image sharpness and recognition performance and then utilize this information to direct the system design. In this chapter, firstly, we introduce the development of recent palmprint acquisition systems and abstract their basic frameworks to propose the key problems needed to be solved when designing new systems. Secondly, the relationship between the palm distance in the field of view (FOV) and image pixels per inch (PPI) is studied based on the imaging model. Suggestions about how to select the imaging sensor and camera lens are provided. Thirdly, image blur and depth of focus (DOF) are taken into consideration; the recognition performances of the image layers in the Gaussian scale space are analyzed. Based on this, an image sharpness range is determined for optimal imaging. The experiment results are obtained using different algorithms on various touchless palmprint databases collected using different kinds of devices. They could be references for new system design

    Contributions to non-conventional biometric systems : improvements on the fingerprint, facial and handwriting recognition approach

    Get PDF
    Tese (doutorado)—Universidade de Brasília, Faculdade de Tecnologia, Departamento de Engenharia Mecânica, 2021.Os sistemas biométricos são amplamente utilizados pela sociedade. A maioria das aplicações desses sistemas está associada à identificação civil e à investigação criminal. No entanto, com o tempo, o desempenho dos métodos tradicionais de biometria está chegando ao limite. Neste contexto, sistemas biométricos emergentes ou não convencionais estão ganhando importância. Embora promissores, novos sistemas, assim como qualquer nova tecnologia, trazem consigo não apenas potencialidades, mas também fragilidades. Este trabalho apresenta contribuições para três importantes sistemas biométricos não convencionais (SBNC): impressão digital, reconhecimento facial e reconhecimento de escrita. No que diz respeito às impressões digitais, este trabalho apresenta um novo método para detectar a vida em dispositivos de impressão digital multivista sem toque, utilizando descritores de textura e redes neurais artificiais. Com relação ao reconhecimento facial, um método de reconhecimento de faces baseado em algoritmos de característica invariante à escala (SIFT e SURF) que opera sem a necessidade de treinamento prévio do classificador e que realiza o rastreamento de indivíduos em ambientes não controlados é apresentado. Finalmente, um método de baixo custo que usa sinais de acelerômetro e giroscópio obtidos a partir de um sensor acoplado a canetas convencionais para realizar o reconhecimento em tempo real de assinaturas é apresentado. Resultados mostram que os métodos propostos são promissores e que juntos podem contribuir para o aprimoramento dos SBNCCoordenação de Aperfeiçoamento de Pessoal de Nível Superior (CAPES).Biometric systems are widely used by society. Most applications are associated with civil identification and criminal investigation. However, over time, traditional methods of performing biometrics have been reaching their limits. In this context, emerging or nonconventional biometric systems (NCBS) are gaining ground. Although promising, new systems, as well as any new technology, bring not only potentialities but also weaknesses. This work presents contributions to three important non-conventional biometric systems: fingerprint, facial, and handwriting recognition. With regard to fingerprints, this work presents a novel method for detecting life on Touchless Multi-view Fingerprint Devices, using Texture Descriptors and Artificial Neural Networks. With regard to face recognition, a facial recognition method is presented, based on Scale Invariant Feature Algorithms (SIFT and SURF), that operates without the need of previous training of a classifier and can be used to track individuals in an unconstrained environment. Finally, a low-cost on-line handwriting signature recognition method that uses accelerometer and gyroscope signals obtained from a sensor coupled to conventional pens to identify individuals in real time is presented. Results show that the proposed methods are promising and that together may contribute to the improvement of the NCB

    Biometric Spoofing: A JRC Case Study in 3D Face Recognition

    Get PDF
    Based on newly available and affordable off-the-shelf 3D sensing, processing and printing technologies, the JRC has conducted a comprehensive study on the feasibility of spoofing 3D and 2.5D face recognition systems with low-cost self-manufactured models and presents in this report a systematic and rigorous evaluation of the real risk posed by such attacking approach which has been complemented by a test campaign. The work accomplished and presented in this report, covers theories, methodologies, state of the art techniques, evaluation databases and also aims at providing an outlook into the future of this extremely active field of research.JRC.G.6-Digital Citizen Securit

    Watermarking techniques for genuine fingerprint authentication.

    Get PDF
    Fingerprints have been used to authenticate people remotely and allow them access to a system. However, the fingerprint-capture sensor is cracked easily using false fingerprint features constructed from a glass surface. Fake fingerprints, which can be easily obtained by attackers, could cheat the system and this issue remains a challenge in fingerprint-based authentication systems. Thus, a mechanism that can validate the originality of fingerprint samples is desired. Watermarking techniques have been used to enhance the fingerprint-based authentication process, however, none of them have been found to satisfy genuine person verification requirements. This thesis focuses on improving the verification of the genuine fingerprint owner using watermarking techniques. Four research issues are being addressed to achieve the main aim of this thesis. The first research task was to embed watermark into fingerprint images collected from different angles. In verification systems, an acquired fingerprint image is compared with another image, which was stored in the database at the time of enrolment. The displacements and rotations of fingerprint images collected from different angles lead to different sets of minutiae. In this case, the fingerprint-based authentication system operates on the ‘close enough’ matching principle between samples and template. A rejection of genuine samples can occur erroneously in such cases. The process of embedding watermarks into fingerprint samples could make this worse by adding spurious minutiae or corrupting correct minutiae. Therefore, a watermarking method for fingerprint images collected from different angles is proposed. Second, embedding high payload of watermark into fingerprint image and preserving the features of the fingerprint from being affected by the embedded watermark is challenging. In this scenario, embedding multiple watermarks that can be used with fingerprint to authenticate the person is proposed. In the developed multi-watermarks schema, two watermark images of high payloads are embedded into fingerprints without significantly affecting minutiae. Third, the robustness of the watermarking approach against image processing operations is important. The implemented fingerprint watermarking algorithms have been proposed to verify the origin of the fingerprint image; however, they are vulnerable to several modes of image operations that can affect the security level of the authentication system. The embedded watermarks, and the fingerprint features that are used subsequently for authentication purposes, can be damaged. Therefore, the current study has evaluated in detail the robustness of the proposed watermarking methods to the most common image operations. Fourth, mobile biometrics are expected to link the genuine user to a claimed identity in ubiquitous applications, which is a great challenge. Touch-based sensors for capturing fingerprints have been incorporated into mobile phones for user identity authentication. However, an individual fake fingerprint cracking the sensor on the iPhone 5S is a warning that biometrics are only a representation of a person, and are not secure. To make thing worse, the ubiquity of mobile devices leaves much room for adversaries to clone, impersonate or fabricate fake biometric identities and/or mobile devices to defraud systems. Therefore, the integration of multiple identifiers for both the capturing device and its owner into one unique entity is proposed

    Viewing versus Experiencing in Adopting Somatosensory Technology for Smart Applications

    Get PDF
    Emerging somatosensory technology offers unprecedented opportunities for researchers and industrial practitioners to design a touchless smart home system. However, existing touchless smart home systems often fail to attract a satisfying level of acceptance among home owners. The experience users have with the touchless system is key to making somatosensory technology a pervasive computing home application, yet little research has been conducted to assess the influence of direct and indirect experience on user’s behavioral intention to use somatosensory technology. To address this research gap, this paper set up an experimental design to investigate the influence of direct and indirect experience in user technology acceptance. Using an in-house developed touchless system, two experimental studies (i.e., video observation versus product trial) were conducted with sixty-two participants to investigate whether the user experience has an impact on the adoption decision. Our findings indicate that direct experience has an impact on a user’s acceptance of somatosensory technology. We found a significant difference in the relationships between perceived complexity and usage intentions. Perceived complexity was a significant predictor of an individual’s behavioral intention to use the touchless system after video observation, while its relationship to usage intention was insignificant after the user had direct experience with touchless system. Our study reveals an important implication for somatosensory technology marketers, in which product trial (direct experience) engenders more reliable inferences than does exposure to video demonstration (indirect experience). Based on this, companies should devise marketing programme involving direct experience (e.g., product trial and showroom visit) to promote new somatosensory-enabled smart home systems. The results of the study also demonstrate that user experience in research design may influence the results of the Technology Acceptance Model (TAM) studies. Available at: https://aisel.aisnet.org/pajais/vol6/iss3/2

    BIOMETRIC TECHNOLOGIES FOR AMBIENT INTELLIGENCE

    Get PDF
    Il termine Ambient Intelligence (AmI) si riferisce a un ambiente in grado di riconoscere e rispondere alla presenza di diversi individui in modo trasparente, non intrusivo e spesso invisibile. In questo tipo di ambiente, le persone sono circondate da interfacce uomo macchina intuitive e integrate in oggetti di ogni tipo. Gli scopi dell\u2019AmI sono quelli di fornire un supporto ai servizi efficiente e di facile utilizzo per accrescere le potenzialit\ue0 degli individui e migliorare l\u2019interazioni uomo-macchina. Le tecnologie di AmI possono essere impiegate in contesti come uffici (smart offices), case (smart homes), ospedali (smart hospitals) e citt\ue0 (smart cities). Negli scenari di AmI, i sistemi biometrici rappresentano tecnologie abilitanti al fine di progettare servizi personalizzati per individui e gruppi di persone. La biometria \ue8 la scienza che si occupa di stabilire l\u2019identit\ue0 di una persona o di una classe di persone in base agli attributi fisici o comportamentali dell\u2019individuo. Le applicazioni tipiche dei sistemi biometrici includono: controlli di sicurezza, controllo delle frontiere, controllo fisico dell\u2019accesso e autenticazione per dispositivi elettronici. Negli scenari basati su AmI, le tecnologie biometriche devono funzionare in condizioni non controllate e meno vincolate rispetto ai sistemi biometrici comunemente impiegati. Inoltre, in numerosi scenari applicativi, potrebbe essere necessario utilizzare tecniche in grado di funzionare in modo nascosto e non cooperativo. In questo tipo di applicazioni, i campioni biometrici spesso presentano una bassa qualit\ue0 e i metodi di riconoscimento biometrici allo stato dell\u2019arte potrebbero ottenere prestazioni non soddisfacenti. \uc8 possibile distinguere due modi per migliorare l\u2019applicabilit\ue0 e la diffusione delle tecnologie biometriche negli scenari basati su AmI. Il primo modo consiste nel progettare tecnologie biometriche innovative che siano in grado di funzionare in modo robusto con campioni acquisiti in condizioni non ideali e in presenza di rumore. Il secondo modo consiste nel progettare approcci biometrici multimodali innovativi, in grado di sfruttare a proprio vantaggi tutti i sensori posizionati in un ambiente generico, al fine di ottenere un\u2019elevata accuratezza del riconoscimento ed effettuare autenticazioni continue o periodiche in modo non intrusivo. Il primo obiettivo di questa tesi \ue8 la progettazione di sistemi biometrici innovativi e scarsamente vincolati in grado di migliorare, rispetto allo stato dell\u2019arte attuale, la qualit\ue0 delle tecniche di interazione uomo-macchine in diversi scenari applicativi basati su AmI. Il secondo obiettivo riguarda la progettazione di approcci innovativi per migliorare l\u2019applicabilit\ue0 e l\u2019integrazione di tecnologie biometriche eterogenee negli scenari che utilizzano AmI. In particolare, questa tesi considera le tecnologie biometriche basate su impronte digitali, volto, voce e sistemi multimodali. Questa tesi presenta le seguenti ricerche innovative: \u2022 un metodo per il riconoscimento del parlatore tramite la voce in applicazioni che usano AmI; \u2022 un metodo per la stima dell\u2019et\ue0 dell\u2019individuo da campioni acquisiti in condizioni non-ideali nell\u2019ambito di scenari basati su AmI; \u2022 un metodo per accrescere l\u2019accuratezza del riconoscimento biometrico in modo protettivo della privacy e basato sulla normalizzazione degli score biometrici tramite l\u2019analisi di gruppi di campioni simili tra loro; \u2022 un approccio per la fusione biometrica multimodale indipendente dalla tecnologia utilizzata, in grado di combinare tratti biometrici eterogenei in scenari basati su AmI; \u2022 un approccio per l\u2019autenticazione continua multimodale in applicazioni che usano AmI. Le tecnologie biometriche innovative progettate e descritte in questa tesi sono state validate utilizzando diversi dataset biometrici (sia pubblici che acquisiti in laboratorio), i quali simulano le condizioni che si possono verificare in applicazioni di AmI. I risultati ottenuti hanno dimostrato la realizzabilit\ue0 degli approcci studiati e hanno mostrato che i metodi progettati aumentano l\u2019accuratezza, l\u2019applicabilit\ue0 e l\u2019usabilit\ue0 delle tecnologie biometriche rispetto allo stato dell\u2019arte negli scenari basati su AmI.Ambient Intelligence (AmI) refers to an environment capable of recognizing and responding to the presence of different individuals in a seamless, unobtrusive and often invisible way. In this environment, people are surrounded by intelligent intuitive interfaces that are embedded in all kinds of objects. The goals of AmI are to provide greater user-friendliness, more efficient services support, user-empowerment, and support for human interactions. Examples of AmI scenarios are smart cities, smart homes, smart offices, and smart hospitals. In AmI, biometric technologies represent enabling technologies to design personalized services for individuals or groups of people. Biometrics is the science of establishing the identity of an individual or a class of people based on the physical, or behavioral attributes of the person. Common applications include: security checks, border controls, access control to physical places, and authentication to electronic devices. In AmI, biometric technologies should work in uncontrolled and less-constrained conditions with respect to traditional biometric technologies. Furthermore, in many application scenarios, it could be required to adopt covert and non-cooperative technologies. In these non-ideal conditions, the biometric samples frequently present poor quality, and state-of-the-art biometric technologies can obtain unsatisfactory performance. There are two possible ways to improve the applicability and diffusion of biometric technologies in AmI. The first one consists in designing novel biometric technologies robust to samples acquire in noisy and non-ideal conditions. The second one consists in designing novel multimodal biometric approaches that are able to take advantage from all the sensors placed in a generic environment in order to achieve high recognition accuracy and to permit to perform continuous or periodic authentications in an unobtrusive manner. The first goal of this thesis is to design innovative less-constrained biometric systems, which are able to improve the quality of the human-machine interaction in different AmI environments with respect to the state-of-the-art technologies. The second goal is to design novel approaches to improve the applicability and integration of heterogeneous biometric systems in AmI. In particular, the thesis considers technologies based on fingerprint, face, voice, and multimodal biometrics. This thesis presents the following innovative research studies: \u2022 a method for text-independent speaker identification in AmI applications; \u2022 a method for age estimation from non-ideal samples acquired in AmI scenarios; \u2022 a privacy-compliant cohort normalization technique to increase the accuracy of already deployed biometric systems; \u2022 a technology-independent multimodal fusion approach to combine heterogeneous traits in AmI scenarios; \u2022 a multimodal continuous authentication approach for AmI applications. The designed novel biometric technologies have been tested on different biometric datasets (both public and collected in our laboratory) simulating the acquisitions performed in AmI applications. Results proved the feasibility of the studied approaches and shown that the studied methods effectively increased the accuracy, applicability, and usability of biometric technologies in AmI with respect to the state-of-the-art
    • …
    corecore