342 research outputs found

    Bio-cryptography using Zernike Moments and Key Generation by Cubic Splines

    Get PDF
    Cryptography is the process of protecting sensitive information and making it unreadable to unwanted parties. Since all algorithms that perform this task depend on the process of finding a suitable key, the key generation is considered the soul of powerful encryption. The traditionally generated keys are long and random, hence are difficult to memorize, and we need a database to store the keys. To alleviate this limitation, we use bio-cryptography that is combined of biometrics and cryptography. Using Bio-Cryptography generated keys provides the necessary security through powerful encryption and decryption of data. This paper uses cubic spline to generate a cryptographic key through extracting the features from fingerprint. The approach is based on extracting the features generated by using Zernike Moment on a biometric, and then sending these features to a Cubic-Spline Interpolator to generate the keys. A key encryption will be generated for every person through extracting the features from his / her biometric (fingerprint) and then applying these features on the cubic spline interpolator to obtain some points. These interpolated points will be used as keys to encrypt the information by using a suitable encryption algorithm.  The benefit presented by this approach is to ensure a high level of security to protect the information through generating secure keys ready to be used for unsecured channel. In this paper, we used fingerprints from Biometric Recognition Group - ATVS to examine the performance of this approach. Keywords: Biometrics, Key Generation, Zernike Moment, Cubic Spline, Cryptography, RSA, Fingerprint

    Exerting Moment Algorithms for Restoration of Blurred Images

    Get PDF
    In this paper presents the restoration of blurred images which gets degraded due to diverse atmospheric and environmental conditions, so it is essential to restore the original image. The research outcomes exhibit the major identified bottleneck for restoration is to deal with the blurred image as an input to imaging agent employing various methodologies ranging from principle component analysis to momentary algorithms and also a set of attempts are been executed in image restoration using various algorithms. However the precise results are not been proposed and demonstrated in the comparable researches. Also detail understanding for applications of moment algorithms for image restoration and demonstrating the benefits of geometric and orthogonal moments are becoming the recent requirements for research

    Covariate conscious approach for Gait recognition based upon Zernike moment invariants

    Full text link
    Gait recognition i.e. identification of an individual from his/her walking pattern is an emerging field. While existing gait recognition techniques perform satisfactorily in normal walking conditions, there performance tend to suffer drastically with variations in clothing and carrying conditions. In this work, we propose a novel covariate cognizant framework to deal with the presence of such covariates. We describe gait motion by forming a single 2D spatio-temporal template from video sequence, called Average Energy Silhouette image (AESI). Zernike moment invariants (ZMIs) are then computed to screen the parts of AESI infected with covariates. Following this, features are extracted from Spatial Distribution of Oriented Gradients (SDOGs) and novel Mean of Directional Pixels (MDPs) methods. The obtained features are fused together to form the final well-endowed feature set. Experimental evaluation of the proposed framework on three publicly available datasets i.e. CASIA dataset B, OU-ISIR Treadmill dataset B and USF Human-ID challenge dataset with recently published gait recognition approaches, prove its superior performance.Comment: 11 page

    On Generative Adversarial Network Based Synthetic Iris Presentation Attack And Its Detection

    Get PDF
    Human iris is considered a reliable and accurate modality for biometric recognition due to its unique texture information. Reliability and accuracy of iris biometric modality have prompted its large-scale deployment for critical applications such as border control and national identification projects. The extensive growth of iris recognition systems has raised apprehensions about the susceptibility of these systems to various presentation attacks. In this thesis, a novel iris presentation attack using deep learning based synthetically generated iris images is presented. Utilizing the generative capability of deep convolutional generative adversarial networks and iris quality metrics, a new framework, named as iDCGAN is proposed for creating realistic appearing synthetic iris images. In-depth analysis is performed using quality score distributions of real and synthetically generated iris images to understand the effectiveness of the proposed approach. We also demonstrate that synthetically generated iris images can be used to attack existing iris recognition systems. As synthetically generated iris images can be effectively deployed in iris presentation attacks, it is important to develop accurate iris presentation attack detection algorithms which can distinguish such synthetic iris images from real iris images. For this purpose, a novel structural and textural feature-based iris presentation attack detection framework (DESIST) is proposed. The key emphasis of DESIST is on developing a unified framework for detecting a medley of iris presentation attacks, including synthetic iris. Experimental evaluations showcase the efficacy of the proposed DESIST framework in detecting synthetic iris presentation attacks

    A Comparative Experiment of Several Shape Methods in Recognizing Plants

    Full text link
    Shape is an important aspects in recognizing plants. Several approaches have been introduced to identify objects, including plants. Combination of geometric features such as aspect ratio, compactness, and dispersion, or moments such as moment invariants were usually used toidentify plants. In this research, a comparative experiment of 4 methods to identify plants using shape features was accomplished. Two approaches have never been used in plants identification yet, Zernike moments and Polar Fourier Transform (PFT), were incorporated. The experimental comparison was done on 52 kinds of plants with various shapes. The result, PFT gave best performance with 64% in accuracy and outperformed the other methods.Comment: 8 pages; International Journal of Computer Science & Information Technology (IJCSIT), Vol 3, No 3, June 201

    Biometrics in Cyber Security

    Get PDF
    Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM

    Hand-Based Biometric Analysis

    Get PDF
    Hand-based biometric analysis systems and techniques are described which provide robust hand-based identification and verification. An image of a hand is obtained, which is then segmented into a palm region and separate finger regions. Acquisition of the image is performed without requiring particular orientation or placement restrictions. Segmentation is performed without the use of reference points on the images. Each segment is analyzed by calculating a set of Zernike moment descriptors for the segment. The feature parameters thus obtained are then fused and compared to stored sets of descriptors in enrollment templates to arrive at an identity decision. By using Zernike moments, and through additional manipulation, the biometric analysis is invariant to rotation, scale, or translation or an in put image. Additionally, the analysis utilizes re-use of commonly-seen terms in Zernike calculations to achieve additional efficiencies over traditional Zernike moment calculation

    Algorithm for Fingerprint Verification System

    Get PDF
    Extraction of minutiae based features from good quality fingerprint images is more effective for fingerprint recognition in comparison with features from low quality fingerprint. In this paper, a new technique for fingerprint feature extraction based on ridge pattern is proposed. Robust features are extracted from fingerprint image notwithstanding the quality of the image. The variation within different person fingerprint is established using centre of gravity of the fingerprint image as the reference point for effective classification. Similarity measure in term of Euclidean distance is compute for test fingerprint image
    • …
    corecore