729 research outputs found

    An Efficient Vein Pattern-based Recognition System

    Full text link
    This paper presents an efficient human recognition system based on vein pattern from the palma dorsa. A new absorption based technique has been proposed to collect good quality images with the help of a low cost camera and light source. The system automatically detects the region of interest from the image and does the necessary preprocessing to extract features. A Euclidean Distance based matching technique has been used for making the decision. It has been tested on a data set of 1750 image samples collected from 341 individuals. The accuracy of the verification system is found to be 99.26% with false rejection rate (FRR) of 0.03%.Comment: IEEE Publication format, International Journal of Computer Science and Information Security, IJCSIS, Vol. 8 No. 1, April 2010, USA. ISSN 1947 5500, http://sites.google.com/site/ijcsis

    Finger Vein Recognition Based on PCA Feature using Artificial Neural Network

    Get PDF
    Personal recognition technology is developing rapidly as a security system. Traditional methods such as authentication key; password: card is not secure enough, because they could be stolen or easily forget. Biometrics has been applied to a wide range of systems. According to various researchers, vein biometrics was a good technique from other biometric authentication system used, such as fingerprints, hand geometry, voice, etc. of the DNA. Root Authentication systems can be designed in different ways. All methods include the matching stage. A neural network is an effective way of matching Personal identification authentication system. The finger vein pattern is unique biometric identity of the human beings. The finger vein recognition is a popular biometric technique which is used for authentication purposes in various applications. In the propose work an algorithm is proposed to find the accuracy, FRR and FAR of finger vein recognition. The performances of PCA, threshold segmentation, pre-processing and testing & training techniques has been validate and compared with each other in order to determine the most accurate results in terms of finger vein recognition

    Handbook of Vascular Biometrics

    Get PDF

    Biometric Security for Cell Phones

    Get PDF
    Cell phones are already prime targets for theft. The increasing functionality of cell phones is making them even more attractive. With the increase of cell phone functionality including personal digital assistance, banking, e-commerce, remote work, internet access and entertainment, more and more confidential data is stored on these devices. What is protecting this confidential data stored on cell phones? Studies have shown that even though most of the cell phone users are aware of the PIN security feature more than 50% of them are not using it either because of the lack of confidence in it or because of the inconvenience. A large majority of those users believes that an alternative approach to security would be a good idea.biometrics, security, fingerprint, face recognition, cell phones

    Hand Geometry Techniques: A Review

    Full text link
    Volume 2 Issue 11 (November 2014

    Palm vein recognition using scale invariant feature transform with RANSAC mismatching removal

    Get PDF
    Palm vein recognition has been gaining increasing interest as a biometric method, although there still remains an issue regarding difficulties in obtaining robust signals. In this paper, the effects of random sample consensus point mismatching removal and the use of different wavelengths of illumination on the recognition rate are investigated. The CASIA multi-spectral palm print image database was used to provide input signals and the scale invariant feature transform (SIFT) and random sample consensus (RANSAC) mismatching removal approaches were adopted for vein extraction and point feature matching. The results show that the RANSAC mismatching point removal was able to eliminate outliers while preserving the appropriate SIFT key points and that this led to an improvement in the equal error rate metric, signifying better recognition performance. The palm vein recognition system was found to achieve a better verification rate when infrared illumination in a specific spectral band was used to obtain the palm vein image

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    Handbook of Vascular Biometrics

    Get PDF
    This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers
    • …
    corecore