87 research outputs found

    Review of Multimodal Biometric Identification Using Hand Feature and Face

    Full text link
    In the era of Information Technology, openness of the information is a major concern. As the confidentiality and integrity of the information is critically important, it has to be secured from unauthorized access. Security refers to prohibit some unauthorized persons from some important data or from some precious assets. So we need accurateness on automatic personal identification in various applications such as ATM, driving license, passports, citizen's card, cellular telephones, voter's ID card etc. Unimodal system carries some problems such as Noise in sensed data, Intra-class variations, Inter-class similarities, Non-universality and Spoof attacks. The accuracy of system is improved by combining different biometric traits which are called multimodal. This system gives more accuracy as it would be difficult for imposter to spoof multiple biometric traits simultaneously. This paper reviews different methods for fusion of biometric traits

    Poor Quality Fingerprint Recognition Based on Wave Atom Transform

    Get PDF
    Fingerprint is considered the most practical biometrics due to some specific features which make them widely accepted. Reliable feature extraction from poor quality fingerprint images is still the most challenging problem in fingerprint recognition system. Extracting features from poor fingerprint images is not an easy task. Recently, Multi-resolution transforms techniques have been widely used as a feature extractor in the field of biometric recognition. In this paper we develop a complete and an efficient fingerprint recognition system that can deal with poor quality fingerprint images. Identification of poor quality fingerprint images needs reliable preprocessing stage, in which an image alignment, segmentation, and enhancement processes are performed. We improve a popular enhancement technique by replacing the segmentation algorithm with another new one. We use Waveatom transforms in extracting distinctive features from the enhanced fingerprint images. The selected features are matched throw K-Nearest neighbor classifier techniques. We test our methodology in 114 subjects selected from a very challenges database; CASIA; and we achieve a high recognition rate of about 99.5%

    Improving Fingerprint Verification Using Minutiae Triplets

    Get PDF
    Improving fingerprint matching algorithms is an active and important research area in fingerprint recognition. Algorithms based on minutia triplets, an important matcher family, present some drawbacks that impact their accuracy, such as dependency to the order of minutiae in the feature, insensitivity to the reflection of minutiae triplets, and insensitivity to the directions of the minutiae relative to the sides of the triangle. To alleviate these drawbacks, we introduce in this paper a novel fingerprint matching algorithm, named M3gl. This algorithm contains three components: a new feature representation containing clockwise-arranged minutiae without a central minutia, a new similarity measure that shifts the triplets to find the best minutiae correspondence, and a global matching procedure that selects the alignment by maximizing the amount of global matching minutiae. To make M3gl faster, it includes some optimizations to discard non-matching minutia triplets without comparing the whole representation. In comparison with six verification algorithms, M3gl achieves the highest accuracy in the lowest matching time, using FVC2002 and FVC2004 databases

    Distributed authentication to preserve privacy through smart card based biometric matching

    Get PDF
    Bibliography: pages 135-139.This thesis focuses on privacy concerns, specifically those relating to the storage and use of biometrics. These concerns result from the fact that biometric information is unique. This uniqueness makes the biometric a very strong identifier increasing the possibility that it could be used to monitor an individual's activities. An expert can extract considerable information from a biometric scan, ranging from the age or gender to whether the individual has certain diseases

    Fingerprint Recognition: A Histogram Analysis Based Fuzzy C-Means Multilevel Structural Approach

    Get PDF
    In order to fight identity fraud, the use of a reliable personal identifier has become a necessity. Fingerprints are considered one of the best biometric measurements and are used as a universal personal identifier. There are two main phases in the recognition of personal identity using fingerprints: 1) extraction of suitable features of fingerprints, and 2) fingerprint matching making use of the extracted features to find the correspondence and similarity between the fingerprint images. Use of global features in minutia-based fingerprint recognition schemes enhances their recognition capability but at the expense of a substantially increased complexity. The recognition accuracies of most of the fingerprint recognition schemes, which rely on some sort of crisp clustering of the fingerprint features, are adversely affected due to the problems associated with the behavioral and anatomical characteristics of the fingerprints. The objective of this research is to develop efficient and cost-effective techniques for fingerprint recognition, that can meet the challenges arising from using both the local and global features of the fingerprints as well as effectively deal with the problems resulting from the crisp clustering of the fingerprint features. To this end, the structural information of local and global features of fingerprints are used for their decomposition, representation and matching in a multilevel hierarchical framework. The problems associated with the crisp clustering of the fingerprint features are addressed by incorporating the ideas of fuzzy logic in developing the various stages of the proposed fingerprint recognition scheme. In the first part of this thesis, a novel low-complexity multilevel structural scheme for fingerprint recognition (MSFR) is proposed by first decomposing fingerprint images into regions based on crisp partitioning of some global features of the fingerprints. Then, multilevel feature vectors representing the structural information of the fingerprints are formulated by employing both the global and local features, and a fast multilevel matching algorithm using this representation is devised. Inspired by the ability of fuzzy-based clustering techniques in dealing more effectively with the natural patterns, in the second part of the thesis, a new fuzzy based clustering technique that can deal with the partitioning problem of the fingerprint having the behavioral and anatomical characteristics is proposed and then used to develop a fuzzy based multilevel structural fingerprint recognition scheme. First, a histogram analysis fuzzy c-means (HA-FCM) clustering technique is devised for the partitioning of the fingerprints. The parameters of this partitioning technique, i.e., the number of clusters and the set of initial cluster centers, are determined in an automated manner by employing the histogram of the fingerprint orientation field. The development of the HA-FCM partitioning scheme is further pursued to devise an enhanced HA-FCM (EAH-FCM) algorithm. In this algorithm, the smoothness of the fingerprint partitioning is improved through a regularization of the fingerprint orientation field, and the computational complexity is reduced by decreasing the number of operations and by increasing the convergence rate of the underlying iterative process of the HA-FCM technique. Finally, a new fuzzy based fingerprint recognition scheme (FMSFR), based on the EHA-FCM partitioning scheme and the basic ideas used in the development of the MSFR scheme, is proposed. Extensive experiments are conducted throughout this thesis using a number of challenging benchmark databases. These databases are selected from the FVC2002, FVC2004 and FVC2006 competitions containing a wide variety of challenges for fingerprint recognition. Simulation results demonstrate not only the effectiveness of the proposed techniques and schemes but also their superiority over some of the state-of-the-art techniques, in terms of the recognition accuracy and the computational complexity

    Recent Application in Biometrics

    Get PDF
    In the recent years, a number of recognition and authentication systems based on biometric measurements have been proposed. Algorithms and sensors have been developed to acquire and process many different biometric traits. Moreover, the biometric technology is being used in novel ways, with potential commercial and practical implications to our daily activities. The key objective of the book is to provide a collection of comprehensive references on some recent theoretical development as well as novel applications in biometrics. The topics covered in this book reflect well both aspects of development. They include biometric sample quality, privacy preserving and cancellable biometrics, contactless biometrics, novel and unconventional biometrics, and the technical challenges in implementing the technology in portable devices. The book consists of 15 chapters. It is divided into four sections, namely, biometric applications on mobile platforms, cancelable biometrics, biometric encryption, and other applications. The book was reviewed by editors Dr. Jucheng Yang and Dr. Norman Poh. We deeply appreciate the efforts of our guest editors: Dr. Girija Chetty, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park and Dr. Sook Yoon, as well as a number of anonymous reviewers

    Fingerprint comparison by template matching

    Get PDF

    Ridge orientation modeling and feature analysis for fingerprint identification

    Get PDF
    This thesis systematically derives an innovative approach, called FOMFE, for fingerprint ridge orientation modeling based on 2D Fourier expansions, and explores possible applications of FOMFE to various aspects of a fingerprint identification system. Compared with existing proposals, FOMFE does not require prior knowledge of the landmark singular points (SP) at any stage of the modeling process. This salient feature makes it immune from false SP detections and robust in terms of modeling ridge topology patterns from different typological classes. The thesis provides the motivation of this work, thoroughly reviews the relevant literature, and carefully lays out the theoretical basis of the proposed modeling approach. This is followed by a detailed exposition of how FOMFE can benefit fingerprint feature analysis including ridge orientation estimation, singularity analysis, global feature characterization for a wide variety of fingerprint categories, and partial fingerprint identification. The proposed methods are based on the insightful use of theory from areas such as Fourier analysis of nonlinear dynamic systems, analytical operators from differential calculus in vector fields, and fluid dynamics. The thesis has conducted extensive experimental evaluation of the proposed methods on benchmark data sets, and drawn conclusions about strengths and limitations of these new techniques in comparison with state-of-the-art approaches. FOMFE and the resulting model-based methods can significantly improve the computational efficiency and reliability of fingerprint identification systems, which is important for indexing and matching fingerprints at a large scale

    Multibiometric security in wireless communication systems

    Get PDF
    This thesis was submitted for the degree of Doctor of Philosophy and awarded by Brunel University, 05/08/2010.This thesis has aimed to explore an application of Multibiometrics to secured wireless communications. The medium of study for this purpose included Wi-Fi, 3G, and WiMAX, over which simulations and experimental studies were carried out to assess the performance. In specific, restriction of access to authorized users only is provided by a technique referred to hereafter as multibiometric cryptosystem. In brief, the system is built upon a complete challenge/response methodology in order to obtain a high level of security on the basis of user identification by fingerprint and further confirmation by verification of the user through text-dependent speaker recognition. First is the enrolment phase by which the database of watermarked fingerprints with memorable texts along with the voice features, based on the same texts, is created by sending them to the server through wireless channel. Later is the verification stage at which claimed users, ones who claim are genuine, are verified against the database, and it consists of five steps. Initially faced by the identification level, one is asked to first present one’s fingerprint and a memorable word, former is watermarked into latter, in order for system to authenticate the fingerprint and verify the validity of it by retrieving the challenge for accepted user. The following three steps then involve speaker recognition including the user responding to the challenge by text-dependent voice, server authenticating the response, and finally server accepting/rejecting the user. In order to implement fingerprint watermarking, i.e. incorporating the memorable word as a watermark message into the fingerprint image, an algorithm of five steps has been developed. The first three novel steps having to do with the fingerprint image enhancement (CLAHE with 'Clip Limit', standard deviation analysis and sliding neighborhood) have been followed with further two steps for embedding, and extracting the watermark into the enhanced fingerprint image utilising Discrete Wavelet Transform (DWT). In the speaker recognition stage, the limitations of this technique in wireless communication have been addressed by sending voice feature (cepstral coefficients) instead of raw sample. This scheme is to reap the advantages of reducing the transmission time and dependency of the data on communication channel, together with no loss of packet. Finally, the obtained results have verified the claims
    • 

    corecore