729 research outputs found
An Efficient Vein Pattern-based Recognition System
This paper presents an efficient human recognition system based on vein
pattern from the palma dorsa. A new absorption based technique has been
proposed to collect good quality images with the help of a low cost camera and
light source. The system automatically detects the region of interest from the
image and does the necessary preprocessing to extract features. A Euclidean
Distance based matching technique has been used for making the decision. It has
been tested on a data set of 1750 image samples collected from 341 individuals.
The accuracy of the verification system is found to be 99.26% with false
rejection rate (FRR) of 0.03%.Comment: IEEE Publication format, International Journal of Computer Science
and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947
5500, http://sites.google.com/site/ijcsis
Finger Vein Recognition Based on PCA Feature using Artificial Neural Network
Personal recognition technology is developing rapidly as a security system. Traditional methods such as authentication key; password: card is not secure enough, because they could be stolen or easily forget. Biometrics has been applied to a wide range of systems. According to various researchers, vein biometrics was a good technique from other biometric authentication system used, such as fingerprints, hand geometry, voice, etc. of the DNA. Root Authentication systems can be designed in different ways. All methods include the matching stage. A neural network is an effective way of matching Personal identification authentication system. The finger vein pattern is unique biometric identity of the human beings. The finger vein recognition is a popular biometric technique which is used for authentication purposes in various applications. In the propose work an algorithm is proposed to find the accuracy, FRR and FAR of finger vein recognition. The performances of PCA, threshold segmentation, pre-processing and testing & training techniques has been validate and compared with each other in order to determine the most accurate results in terms of finger vein recognition
Biometric Security for Cell Phones
Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones
Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal
Palm vein recognition has been gaining increasing interest as a biometric method, although there still remains an issue regarding difficulties in obtaining robust signals. In this paper, the effects of random sample consensus point mismatching removal and the use of different wavelengths of illumination on the recognition rate are investigated. The CASIA multi-spectral palm print image database was used to provide input signals and the scale invariant feature transform (SIFT) and random sample consensus (RANSAC) mismatching removal approaches were adopted for vein extraction and point feature matching. The results show that the RANSAC mismatching point removal was able to eliminate outliers while preserving the appropriate SIFT key points and that this led to an improvement in the equal error rate metric, signifying better recognition performance. The palm vein recognition system was found to achieve a better verification rate when infrared illumination in a specific spectral band was used to obtain the palm vein image
A Survey on Biometrics and Cancelable Biometrics Systems
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results
Performance comparison of intrusion detection systems and application of machine learning to Snort system
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort
Handbook of Vascular Biometrics
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers
Recommended from our members
Pattern mining approaches used in sensor-based biometric recognition: a review
Sensing technologies place significant interest in the use of biometrics for the recognition and assessment of individuals. Pattern mining techniques have established a critical step in the progress of sensor-based biometric systems that are capable of perceiving, recognizing and computing sensor data, being a technology that searches for the high-level information about pattern recognition from low-level sensor readings in order to construct an artificial substitute for human recognition. The design of a successful sensor-based biometric recognition system needs to pay attention to the different issues involved in processing variable data being - acquisition of biometric data from a sensor, data pre-processing, feature extraction, recognition and/or classification, clustering and validation. A significant number of approaches from image processing, pattern identification and machine learning have been used to process sensor data. This paper aims to deliver a state-of-the-art summary and present strategies for utilizing the broadly utilized pattern mining methods in order to identify the challenges as well as future research directions of sensor-based biometric systems
- …