63 research outputs found

    Indexing techniques for fingerprint and iris databases

    Get PDF
    This thesis addresses the problem of biometric indexing in the context of fingerprint and iris databases. In large scale authentication system, the goal is to determine the identity of a subject from a large set of identities. Indexing is a technique to reduce the number of candidate identities to be considered by the identification algorithm. The fingerprint indexing technique (for closed set identification) proposed in this thesis is based on a combination of minutiae and ridge features. Experiments conducted on the FVC2002 and FVC2004 databases indicate that the inclusion of ridge features aids in enhancing indexing performance. The thesis also proposes three techniques for iris indexing (for closed set identification). The first technique is based on iriscodes. The second technique utilizes local binary patterns in the iris texture. The third technique analyzes the iris texture based on a pixel-level difference histogram. The ability to perform indexing at the texture level avoids the computational complexity involved in encoding and is, therefore, more attractive for iris indexing. Experiments on the CASIA 3.0 database suggest the potential of these schemes to index large-scale iris databases

    Comparative Study of Fingerprint Database Indexing Methods

    Get PDF
    International audienceNowadays, there are large country-sized fingerprint databases for identification purposes, for border access controls and also for Visa issuance procedures around the world. Fingerprint indexing techniques aim to speed up the research process in automatic fingerprint identification systems. Therefore, several preselection, classification and indexing techniques have been proposed in the literature. However, the proposed systems have been evaluated with different experimental protocols, that makes it difficult to assess their performances. The main objective of this paper is to provide a comparative study of fingerprint indexing methods using a common experimental protocol. Four fingerprint indexing methods, using naive, cascade, matcher and Minutiae Cylinder Code (MCC) approaches are evaluated on FVC databases from the Fingerprint Verification Competition (FVC) using the Cumulative Matches Curve (CMC) and for the first time using also the computing time required. Our study shows that MCC gives the best compromise between identification accuracy and computation time

    Identifying individuals from average quality fingerprint reference templates, when the best do not provide the best results !

    Get PDF
    International audienceThe fingerprint is one of the most used biometric modalities because of its persistence, uniqueness characteristics and ease of acquisition. Nowadays, there are large country-sized fingerprint databases for identification purposes, for border access controls and also for Visa issuance procedures around the world. The objective usually is to identify an input fingerprint among a large fingerprint database. In order to achieve this goal, different fingerprint pre-selection, classification or indexing techniques have been developed to speed up the research process to avoid comparison of the input fingerprint template against each fingerprint in the database. Although these methods are fairly accurate for identification process, we think that all of them assume the hypothesis to have a good quality of the fingerprint template for the first step of enrollment. In this paper, we show how the quality of reference templates can impact the performance of identification algorithms. We collect information and implement differents methods from the state of the art of fingerprint identification. Then, for these differents methods, we vary the quality of reference templates by using NFIQ2 metric quality. This allowed us to build a benchmark in order to evaluate the impact of these different enrollment scenarios on identification

    A Review of Fingerprint Feature Representations and Their Applications for Latent Fingerprint Identification: Trends and Evaluation

    Get PDF
    Latent fingerprint identification is attracting increasing interest because of its important role in law enforcement. Although the use of various fingerprint features might be required for successful latent fingerprint identification, methods based on minutiae are often readily applicable and commonly outperform other methods. However, as many fingerprint feature representations exist, we sought to determine if the selection of feature representation has an impact on the performance of automated fingerprint identification systems. In this paper, we review the most prominent fingerprint feature representations reported in the literature, identify trends in fingerprint feature representation, and observe that representations designed for verification are commonly used in latent fingerprint identification. We aim to evaluate the performance of the most popular fingerprint feature representations over a common latent fingerprint database. Therefore, we introduce and apply a protocol that evaluates minutia descriptors for latent fingerprint identification in terms of the identification rate plotted in the cumulative match characteristic (CMC) curve. From our experiments, we found that all the evaluated minutia descriptors obtained identification rates lower than 10% for Rank-1 and 24% for Rank-100 comparing the minutiae in the database NIST SD27, illustrating the need of new minutia descriptors for latent fingerprint identification.This work was supported in part by the National Council of Science and Technology of Mexico (CONACYT) under Grant PN-720 and Grant 63894

    The Proceedings of 15th Australian Information Security Management Conference, 5-6 December, 2017, Edith Cowan University, Perth, Australia

    Get PDF
    Conference Foreword The annual Security Congress, run by the Security Research Institute at Edith Cowan University, includes the Australian Information Security and Management Conference. Now in its fifteenth year, the conference remains popular for its diverse content and mixture of technical research and discussion papers. The area of information security and management continues to be varied, as is reflected by the wide variety of subject matter covered by the papers this year. The papers cover topics from vulnerabilities in “Internet of Things” protocols through to improvements in biometric identification algorithms and surveillance camera weaknesses. The conference has drawn interest and papers from within Australia and internationally. All submitted papers were subject to a double blind peer review process. Twenty two papers were submitted from Australia and overseas, of which eighteen were accepted for final presentation and publication. We wish to thank the reviewers for kindly volunteering their time and expertise in support of this event. We would also like to thank the conference committee who have organised yet another successful congress. Events such as this are impossible without the tireless efforts of such people in reviewing and editing the conference papers, and assisting with the planning, organisation and execution of the conference. To our sponsors, also a vote of thanks for both the financial and moral support provided to the conference. Finally, thank you to the administrative and technical staff, and students of the ECU Security Research Institute for their contributions to the running of the conference

    Structural Analysis Algorithms for Nanomaterials

    Get PDF

    Affine-Invariant Triangulation of Spatio-Temporal Data with an Application to Image Retrieval

    Get PDF
    In the geometric data model for spatio-temporal data, introduced by Chomicki and Revesz , spatio-temporal data are modelled as a finite collection of triangles that are transformed by time-dependent affinities of the plane. To facilitate querying and animation of spatio-temporal data, we present a normal form for data in the geometric data model. We propose an algorithm for constructing this normal form via a spatio-temporal triangulation of geometric data objects. This triangulation algorithm generates new geometric data objects that partition the given objects both in space and in time. A particular property of the proposed partition is that it is invariant under time-dependent affine transformations, and hence independent of the particular choice of coordinate system used to describe the spatio-temporal data in. We can show that our algorithm works correctly and has a polynomial time complexity (of reasonably low degree in the number of input triangles and the maximal degree of the polynomial functions that describe the transformation functions). We also discuss several possible applications of this spatio-temporal triangulation. The application of our affine-invariant spatial triangulation method to image indexing and retrieval is discussed and an experimental evaluation is given in the context of bird images

    Fingerabdruckswachstumvorhersage, Bildvorverarbeitung und Multi-level Judgment Aggregation

    Get PDF
    Im ersten Teil dieser Arbeit wird Fingerwachstum untersucht und eine Methode zur Vorhersage von Wachstum wird vorgestellt. Die Effektivität dieser Methode wird mittels mehrerer Tests validiert. Vorverarbeitung von Fingerabdrucksbildern wird im zweiten Teil behandelt und neue Methoden zur Schätzung des Orientierungsfelds und der Ridge-Frequenz sowie zur Bildverbesserung werden vorgestellt: Die Line Sensor Methode zur Orientierungsfeldschätzung, gebogene Regionen zur Ridge-Frequenz-Schätzung und gebogene Gabor Filter zur Bildverbesserung. Multi-level Jugdment Aggregation wird eingeführt als Design Prinzip zur Kombination mehrerer Methoden auf mehreren Verarbeitungsstufen. Schließlich wird Score Neubewertung vorgestellt, um Informationen aus der Vorverarbeitung mit in die Score Bildung einzubeziehen. Anhand eines Anwendungsbeispiels wird die Wirksamkeit dieses Ansatzes auf den verfügbaren FVC-Datenbanken gezeigt.Finger growth is studied in the first part of the thesis and a method for growth prediction is presented. The effectiveness of the method is validated in several tests. Fingerprint image preprocessing is discussed in the second part and novel methods for orientation field estimation, ridge frequency estimation and image enhancement are proposed: the line sensor method for orientation estimation provides more robustness to noise than state of the art methods. Curved regions are proposed for improving the ridge frequency estimation and curved Gabor filters for image enhancement. The notion of multi-level judgment aggregation is introduced as a design principle for combining different methods at all levels of fingerprint image processing. Lastly, score revaluation is proposed for incorporating information obtained during preprocessing into the score, and thus amending the quality of the similarity measure at the final stage. A sample application combines all proposed methods of the second part and demonstrates the validity of the approach by achieving massive verification performance improvements in comparison to state of the art software on all available databases of the fingerprint verification competitions (FVC)

    On the Performance Improvement of Iris Biometric System

    Get PDF
    Iris is an established biometric modality with many practical applications. Its performance is influenced by noise, database size, and feature representation. This thesis focusses on mitigating these challenges by efficiently characterising iris texture,developing multi-unit iris recognition, reducing the search space of large iris databases, and investigating if iris pattern change over time.To suitably characterise texture features of iris, Scale Invariant Feature Transform (SIFT) is combined with Fourier transform to develop a keypoint descriptor-F-SIFT. Proposed F-SIFT is invariant to transformation, illumination, and occlusion along with strong texture description property. For pairing the keypoints from gallery and probe iris images, Phase-Only Correlation (POC) function is used. The use of phase information reduces the wrong matches generated using SIFT. Results demonstrate the effectiveness of F-SIFT over existing keypoint descriptors.To perform the multi-unit iris fusion, a novel classifier is proposed known as Incremental Granular Relevance Vector Machine (iGRVM) that incorporates incremental and granular learning into RVM. The proposed classifier by design is scalable and unbiased which is particularly suitable for biometrics. The match scores from individual units of iris are passed as an input to the corresponding iGRVM classifier, and the posterior probabilities are combined using weighted sum rule. Experimentally, it is shown that the performance of multi-unit iris recognition improves over single unit iris. For search space reduction, local feature based indexing approaches are developed using multi-dimensional trees. Such features extracted from annular iris images are used to index the database using k-d tree. To handle the scalability issue of k-d tree, k-d-b tree based indexing approach is proposed. Another indexing approach using R-tree is developed to minimise the indexing errors. For retrieval, hybrid coarse-to-fine search strategy is proposed. It is inferred from the results that unification of hybrid search with R-tree significantly improves the identification performance. Iris is assumed to be stable over time. Recently, researchers have reported that false rejections increase over the period of time which in turn degrades the performance. An empirical investigation has been made on standard iris aging databases to find whether iris patterns change over time. From the results, it is found that the rejections are primarily due to the presence of other covariates such as blur, noise, occlusion, pupil dilation, and not due to agin

    Contributions to the content-based image retrieval using pictorial queries

    Get PDF
    Descripció del recurs: el 02 de novembre de 2010L'accés massiu a les càmeres digitals, els ordinadors personals i a Internet, ha propiciat la creació de grans volums de dades en format digital. En aquest context, cada vegada adquireixen major rellevància totes aquelles eines dissenyades per organitzar la informació i facilitar la seva cerca. Les imatges són un cas particular de dades que requereixen tècniques específiques de descripció i indexació. L'àrea de la visió per computador encarregada de l'estudi d'aquestes tècniques rep el nom de Recuperació d'Imatges per Contingut, en anglès Content-Based Image Retrieval (CBIR). Els sistemes de CBIR no utilitzen descripcions basades en text sinó que es basen en característiques extretes de les pròpies imatges. En contrast a les més de 6000 llengües parlades en el món, les descripcions basades en característiques visuals representen una via d'expressió universal. La intensa recerca en el camp dels sistemes de CBIR s'ha aplicat en àrees de coneixement molt diverses. Així doncs s'han desenvolupat aplicacions de CBIR relacionades amb la medicina, la protecció de la propietat intel·lectual, el periodisme, el disseny gràfic, la cerca d'informació en Internet, la preservació dels patrimoni cultural, etc. Un dels punts importants d'una aplicació de CBIR resideix en el disseny de les funcions de l'usuari. L'usuari és l'encarregat de formular les consultes a partir de les quals es fa la cerca de les imatges. Nosaltres hem centrat l'atenció en aquells sistemes en què la consulta es formula a partir d'una representació pictòrica. Hem plantejat una taxonomia dels sistemes de consulta en composada per quatre paradigmes diferents: Consulta-segons-Selecció, Consulta-segons-Composició-Icònica, Consulta-segons-Esboç i Consulta-segons-Il·lustració. Cada paradigma incorpora un nivell diferent en el potencial expressiu de l'usuari. Des de la simple selecció d'una imatge, fins a la creació d'una il·lustració en color, l'usuari és qui pren el control de les dades d'entrada del sistema. Al llarg dels capítols d'aquesta tesi hem analitzat la influència que cada paradigma de consulta exerceix en els processos interns d'un sistema de CBIR. D'aquesta manera també hem proposat un conjunt de contribucions que hem exemplificat des d'un punt de vista pràctic mitjançant una aplicació final
    corecore