194 research outputs found

    ANALYSIS OF FACIAL MARKS TO DISTINGUISH BETWEEN IDENTICAL TWINS USING NOVEL METHOD

    Get PDF
    Reliable and accurate verification of people is extremely important in a number of business transactions as well as access to privileged information. The biometrics-based methods assume that the physical characteristics of an individual (as captured by a sensor) used for verification are sufficiently unique to distinguish one person from another. But the increase in twin births has created a requirement for biometric systems to accurately determine the identity of a person who has an identical twin. Identical twins have the closest genetics-based relationship and, therefore, the maximum similarity between fingerprints is expected to be found among identical twins. They can’t be discriminated based on DNA. As one of the most successful applications of image analysis and understanding, face recognition has recently received significant attention, especially during the past several years. Identical twin face recognition is a difficult task due to the existence of a high degree of correlation in overall facial appearance. In this paper, we study the usability of facial marks as biometric signatures to distinguish between identical twins. We propose a multi scale automatic facial mark detector based on a gradient-based operator known as the fast radial symmetry transform. The transform detects bright or dark regions with high radial symmetry at different scales. Next, the detections are tracked across scales to determine the prominence of facial marks. Extensive experiments are performed both on manually annotated and on automatically detected facial marks to evaluate the usefulness of facial marks as biometric signatures. The results of our analysis signify the usefulness of the distribution of facial marks as a biometric signature

    Shallow CNNs for the Reliable Detection of Facial Marks

    Get PDF

    Photoplethysmogram Based Biometric Identification for Twins Incorporating Gender Variability

    Get PDF
    This study focuses on a Photoplethysmogram (PPG) based biometric identification for twins incorporating gender variability. To the best of our knowledge, little has been said pertaining to this research which identifies twins using PPG signals. PPG device has been widely used due to its advantages such as non-invasive, low cost and small in size which makes it a convenient analytical tool. PPG signals has the capability to ensure the person to be present during the acquisition process which suggest that PPG can provide liveness detection suitable for a biometric system which is not available in other biometric modalities such as fingerprint. A total of four couple of twins which consists of four female and four male subjects in age range between twenty two to thirty years old were used to assess the feasibility of the proposed system. The acquired PPG signals were then processed to remove unwanted noise using low pass filter. After that, multiple cycles of PPG waveforms were extracted and later classified using Radial Basis Function (RBF) and Bayes Network (BN) to categorize the subjects using the discriminant features to calculate and analyze the performance of this system. The outcome also provides a complimentary mechanism to detect twins besides using the current existing methods

    A Survey on Ear Biometrics

    No full text
    Recognizing people by their ear has recently received significant attention in the literature. Several reasons account for this trend: first, ear recognition does not suffer from some problems associated with other non contact biometrics, such as face recognition; second, it is the most promising candidate for combination with the face in the context of multi-pose face recognition; and third, the ear can be used for human recognition in surveillance videos where the face may be occluded completely or in part. Further, the ear appears to degrade little with age. Even though, current ear detection and recognition systems have reached a certain level of maturity, their success is limited to controlled indoor conditions. In addition to variation in illumination, other open research problems include hair occlusion; earprint forensics; ear symmetry; ear classification; and ear individuality. This paper provides a detailed survey of research conducted in ear detection and recognition. It provides an up-to-date review of the existing literature revealing the current state-of-art for not only those who are working in this area but also for those who might exploit this new approach. Furthermore, it offers insights into some unsolved ear recognition problems as well as ear databases available for researchers

    The study of the applications of biometrics systems: a literature review

    Get PDF
    Biometric systems utilize individual unique identification to verify specific characteristics of an individual to grant access to a system. The unique biometric identification makes duplication or alteration of information almost impossible. This has encouraged the acceptance of biometric technology and enabled the technology to evolve exponentially. Besides the benefits of security features promoted by the biometric system, reciprocally, biometric systems also have limitations that can cause problems. This paper reports on reviews conducted on articles with the aim to identify different types of biometric systems, the application domains, constraints, and limitations of existing biometric systems

    Biometric antispoofing methods: A survey in face recognition

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods", IEEE Access, vol.2, pp. 1530-1552, Dec. 2014In recent decades, we have witnessed the evolution of biometric technology from the rst pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as ngerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoo ng. Spoo ng, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing ef cient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging eld of antispoo ng, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active eld of research.This work was supported in part by the CAM under Project S2009/TIC-1485, in part by the Ministry of Economy and Competitiveness through the Bio-Shield Project under Grant TEC2012-34881, in part by the TABULA RASA Project under Grant FP7-ICT-257289, in part by the BEAT Project under Grant FP7-SEC-284989 through the European Union, and in part by the Cátedra Universidad Autónoma de Madrid-Telefónica

    The Use of Hand Bacteria as a Human Biometric Identifier

    Get PDF
    Molecular and bio-molecular biometrics are an advancing field that involves the analysis of a person\u27s unique biological markers at a molecular level to ascertain identity. Bacteria communities found on the skin of the human hand have shown to be highly diverse and to have a low percentage of similarity between individuals. The goal of this research effort is to see if a person\u27s demographics, primarily ethnicity, share a relationship with the bacteria communities that exist on their hand. A sample collection was carried out in which the left and right inner palms of 250 individuals were swabbed to obtain a total of 500 bacteria samples. Of these, 104 samples covering a range of age, gender, and ethnicity of the participants, were sequenced using 150 paired-end multiplex reads on an Illumina MiSeq. The reads contained the third hypervariable region DNA of the microbial 16S rRNA gene commonly used for microbial identification. Sequences were analyzed using a combination of commercial and custom bioinformatics tools. Results indicated that women that participated in the sample collection had a 15.7% higher diversity of bacteria at the genus level than men. Using a support vector machine with a 60% train and 40% test approach, ethnicities of individuals who provided samples could be classified with a range of 64-93% accuracy depending on the method used. Principal coordinate plots generated by using the unique fraction (UniFrac) algorithm devised by Lozupone et al at University of Colorado at Boulder showed that similar clustering appeared with people of Turkish, Asian Indian, and Middle Eastern descent and less clustering with people of Caucasian and African American descent. Although focused on a small subset of the human population with no temporal variance in bacterial diversity explored, these results provide a basis for performing identification based on human bacteria that can be expanded upon using time varying sampling and other regions of the 16S rRNA gene

    Biometric Spoofing: A JRC Case Study in 3D Face Recognition

    Get PDF
    Based on newly available and affordable off-the-shelf 3D sensing, processing and printing technologies, the JRC has conducted a comprehensive study on the feasibility of spoofing 3D and 2.5D face recognition systems with low-cost self-manufactured models and presents in this report a systematic and rigorous evaluation of the real risk posed by such attacking approach which has been complemented by a test campaign. The work accomplished and presented in this report, covers theories, methodologies, state of the art techniques, evaluation databases and also aims at providing an outlook into the future of this extremely active field of research.JRC.G.6-Digital Citizen Securit

    QUEST Hierarchy for Hyperspectral Face Recognition

    Get PDF
    Face recognition is an attractive biometric due to the ease in which photographs of the human face can be acquired and processed. The non-intrusive ability of many surveillance systems permits face recognition applications to be used in a myriad of environments. Despite decades of impressive research in this area, face recognition still struggles with variations in illumination, pose and expression not to mention the larger challenge of willful circumvention. The integration of supporting contextual information in a fusion hierarchy known as QUalia Exploitation of Sensor Technology (QUEST) is a novel approach for hyperspectral face recognition that results in performance advantages and a robustness not seen in leading face recognition methodologies. This research demonstrates a method for the exploitation of hyperspectral imagery and the intelligent processing of contextual layers of spatial, spectral, and temporal information. This approach illustrates the benefit of integrating spatial and spectral domains of imagery for the automatic extraction and integration of novel soft features (biometric). The establishment of the QUEST methodology for face recognition results in an engineering advantage in both performance and efficiency compared to leading and classical face recognition techniques. An interactive environment for the testing and expansion of this recognition framework is also provided
    corecore