2,800 research outputs found

    Biometrics

    Get PDF
    Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book

    A Review of Voice-Base Person Identification: State-of-the-Art

    Get PDF
    Automated person identification and authentication systems are useful for national security, integrity of electoral processes, prevention of cybercrimes and many access control applications. This is a critical component of information and communication technology which is central to national development. The use of biometrics systems in identification is fast replacing traditional methods such as use of names, personal identification numbers codes, password, etc., since nature bestow individuals with distinct personal imprints and signatures. Different measures have been put in place for person identification, ranging from face, to fingerprint and so on. This paper highlights the key approaches and schemes developed in the last five decades for voice-based person identification systems. Voice-base recognition system has gained interest due to its non-intrusive technique of data acquisition and its increasing method of continually studying and adapting to the person’s changes. Information on the benefits and challenges of various biometric systems are also presented in this paper. The present and prominent voice-based recognition methods are discussed. It was observed that these systems application areas have covered intelligent monitoring, surveillance, population management, election forensics, immigration and border control

    Biometrics in schools: the role of authentic and inauthentic social transactions

    Get PDF
    Biometrics have always been part of the social world, but it is only recently that we have moved from an instinctive human model of recognition to a digital one. Recent scientific developments in the field have been capitalised upon by the commercial sector and exploited in various respects by school administration systems, with biometrics becoming comparatively widespread in UK and US schools. This brings both advantages and disadvantages as biometrics begin to change the fundamental relationship between institutions and the children in their care. This paper discusses the current state of research in terms of biometrics and social identity, the impact of commercial pressures to adopt biometric systems, and the growing relationship with data privacy issues. It analyses potential problems surrounding unproblematic adoption, and discusses how this might inform future data privacy policies. Additionally, in the paper, I identify three key social issues relating to biometric use in schools, and offer a theory of social exchange, building on the work of Homans. This includes a classification of authentic versus inauthentic transations, in the democratic sense. Finally, the paper identifies biometrics as an area of social (and legal) risk for the future

    Biometrics in Schools

    Get PDF
    Biometrics have always been part of the social world, but it is only recently that we have moved from an instinctive human model to a digital one. Anyone who has been a school student will be aware that, along with eyes in the back of their heads, teachers are supposed to have a mythical sixth sense that means they are able to smell potential trouble a mile off, or identify potential culprits by individual gaits as they attempt to escape. Teachers have also long been regarded as societal experts in identifying homework and examination cheating, in the form of informally analysing patterns of handwriting and pencil use, as those of us who have attended school ourselves may recall. However identification techniques in school are currently in a process of being corporatised and commoditised, with biometric technologies being at the forefront of these developments. This chapter discusses the social and theoretical context for such change

    Handbook of Vascular Biometrics

    Get PDF

    Biometric antispoofing methods: A survey in face recognition

    Full text link
    Personal use of this material is permitted. Permission from IEEE must be obtained for all other uses, in any current or future media, including reprinting/republishing this material for advertising or promotional purposes, creating new collective works, for resale or redistribution to servers or lists, or reuse of any copyrighted component of this work in other works. J. Galbally, S. Marcel and J. Fierrez, "Biometric Antispoofing Methods", IEEE Access, vol.2, pp. 1530-1552, Dec. 2014In recent decades, we have witnessed the evolution of biometric technology from the rst pioneering works in face and voice recognition to the current state of development wherein a wide spectrum of highly accurate systems may be found, ranging from largely deployed modalities, such as ngerprint, face, or iris, to more marginal ones, such as signature or hand. This path of technological evolution has naturally led to a critical issue that has only started to be addressed recently: the resistance of this rapidly emerging technology to external attacks and, in particular, to spoo ng. Spoo ng, referred to by the term presentation attack in current standards, is a purely biometric vulnerability that is not shared with other IT security solutions. It refers to the ability to fool a biometric system into recognizing an illegitimate user as a genuine one by means of presenting a synthetic forged version of the original biometric trait to the sensor. The entire biometric community, including researchers, developers, standardizing bodies, and vendors, has thrown itself into the challenging task of proposing and developing ef cient protection methods against this threat. The goal of this paper is to provide a comprehensive overview on the work that has been carried out over the last decade in the emerging eld of antispoo ng, with special attention to the mature and largely deployed face modality. The work covers theories, methodologies, state-of-the-art techniques, and evaluation databases and also aims at providing an outlook into the future of this very active eld of research.This work was supported in part by the CAM under Project S2009/TIC-1485, in part by the Ministry of Economy and Competitiveness through the Bio-Shield Project under Grant TEC2012-34881, in part by the TABULA RASA Project under Grant FP7-ICT-257289, in part by the BEAT Project under Grant FP7-SEC-284989 through the European Union, and in part by the Cátedra Universidad Autónoma de Madrid-Telefónica

    A Novel Encryption Method for Dorsal Hand Vein Images on a Microcomputer

    Get PDF
    In this paper, a Lorenz-like chaotic system was developed to encrypt the dorsal hand patterns on a microcomputer. First, the dorsal hand vein images were taken from the subjects via an infrared camera. These were subjected to two different processes called contrast enhancement and segmentation of vein regions. Second, the pre- and post-processed images were encrypted with a new encryption algorithm in the microcomputer environment. For the encryption process, random numbers were generated by the chaotic system. These random numbers were subjected to NIST-800-22 test which is the most widely accepted statistical test suite. The speeded up robust feature (SURF) matching algorithm was utilized in the initial condition sensitivity analysis of the encrypted images. The results of the analysis have shown that the proposed encryption algorithm can be used in identification and verification systems. The encrypted images were analyzed with histogram, correlation, entropy, pixel change rate (NPCR), initial condition sensitivity, data loss, and noise attacks which are frequently used for security analyses in the literature. In addition, the images were analyzed after noise attacks by means of peak signal-to-noise ratio (PSNR), mean square error (MSE), and the structural similarity index (SSIM) tests. It has been shown that the dorsal hand vein images can be used in identification systems safely with the help of the proposed method on microcomputers.This work was supported by the Qatar National-LibraryScopu

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers

    The fundamentals of unimodal palmprint authentication based on a biometric system: A review

    Get PDF
    Biometric system can be defined as the automated method of identifying or authenticating the identity of a living person based on physiological or behavioral traits. Palmprint biometric-based authentication has gained considerable attention in recent years. Globally, enterprises have been exploring biometric authorization for some time, for the purpose of security, payment processing, law enforcement CCTV systems, and even access to offices, buildings, and gyms via the entry doors. Palmprint biometric system can be divided into unimodal and multimodal. This paper will investigate the biometric system and provide a detailed overview of the palmprint technology with existing recognition approaches. Finally, we introduce a review of previous works based on a unimodal palmprint system using different databases
    corecore