189 research outputs found
Fingerprint Matching using A Hybrid Shape and Orientation Descriptor
From the privacy perspective most concerns arise from the storage and misuse of
biometric data (Cimato et al., 2009). ... is provided with a in-depth discussion of
the state-of-the-art in iris biometric cryptosystems, which completes this work
Multi-Modal Biometrics: Applications, Strategies and Operations
The need for adequate attention to security of lives and properties cannot be over-emphasised. Existing approaches to security management by various agencies and sectors have focused on the use of possession (card, token) and knowledge (password, username)-based strategies which are susceptible to forgetfulness, damage, loss, theft, forgery and other activities of fraudsters. The surest and most appropriate strategy for handling these challenges is the use of naturally endowed biometrics, which are the human physiological and behavioural characteristics. This paper presents an overview of the use of biometrics for human verification and identification. The applications, methodologies, operations, integration, fusion and strategies for multi-modal biometric systems that give more secured and reliable human identity management is also presented
Biometrics based privacy-preserving authentication and mobile template protection
Smart mobile devices are playing a more and more important role in our daily life. Cancelable biometrics is a promising mechanism to provide authentication to mobile devices and protect biometric templates by applying a noninvertible transformation to raw biometric data. However, the negative effect of nonlinear distortion will usually degrade the matching performance significantly, which is a nontrivial factor when designing a cancelable template. Moreover, the attacks via record multiplicity (ARM) present a threat to the existing cancelable biometrics, which is still a challenging open issue. To address these problems, in this paper, we propose a new cancelable fingerprint template which can not only mitigate the negative effect of nonlinear distortion by combining multiple feature sets, but also defeat the ARM attack through a proposed feature decorrelation algorithm. Our work is a new contribution to the design of cancelable biometrics with a concrete method against the ARM attack. Experimental results on public databases and security analysis show the validity of the proposed cancelable template
Fingerabdruckswachstumvorhersage, Bildvorverarbeitung und Multi-level Judgment Aggregation
Im ersten Teil dieser Arbeit wird Fingerwachstum
untersucht und eine Methode zur Vorhersage von Wachstum
wird vorgestellt. Die Effektivität dieser Methode wird
mittels mehrerer Tests validiert. Vorverarbeitung von
Fingerabdrucksbildern wird im zweiten Teil behandelt
und neue Methoden zur Schätzung des Orientierungsfelds
und der Ridge-Frequenz sowie zur Bildverbesserung
werden vorgestellt: Die Line Sensor Methode zur
Orientierungsfeldschätzung, gebogene Regionen zur
Ridge-Frequenz-Schätzung und gebogene Gabor Filter zur
Bildverbesserung. Multi-level Jugdment Aggregation wird
eingeführt als Design Prinzip zur Kombination mehrerer
Methoden auf mehreren Verarbeitungsstufen. Schließlich
wird Score Neubewertung vorgestellt, um Informationen
aus der Vorverarbeitung mit in die Score Bildung
einzubeziehen. Anhand eines Anwendungsbeispiels wird
die Wirksamkeit dieses Ansatzes auf den verfügbaren
FVC-Datenbanken gezeigt.Finger growth is studied in the first part of the
thesis and a method for growth prediction is presented.
The effectiveness of the method is validated in several
tests. Fingerprint image preprocessing is discussed in
the second part and novel methods for orientation field
estimation, ridge frequency estimation and image
enhancement are proposed: the line sensor method for
orientation estimation provides more robustness to
noise than state of the art methods. Curved regions are
proposed for improving the ridge frequency estimation
and curved Gabor filters for image enhancement. The
notion of multi-level judgment aggregation is
introduced as a design principle for combining
different methods at all levels of fingerprint image
processing. Lastly, score revaluation is proposed for
incorporating information obtained during preprocessing
into the score, and thus amending the quality of the
similarity measure at the final stage. A sample
application combines all proposed methods of the second
part and demonstrates the validity of the approach by
achieving massive verification performance improvements
in comparison to state of the art software on all
available databases of the fingerprint verification
competitions (FVC)
Organisational learning in forensic fingerprint investigation : Solving critical challenges with organisational rule construction.
The present study analyses data collected from a series of developmental seminars in a fingerprint laboratory during which fingerprint examiners jointly discussed and developed their work processes, analytical methods, decision-making criteria and rules of documentation. The analysed organizational development took place in the context of moving from paper to digital documentation and from individually to collectively mastered work process. The fingerprint examiners who participated in the seminar series jointly reflected on their existing professional rules and operational practices, improvement of which was called for to facilitate organizational learning. The analysed data set consists of 10 audio-recorded developmental seminars with written documents as well as notes and decisions that were made during the seminar. The results of the study will reveal the complex ways in which the fingerprint examiners share their practical professional knowledge and collectively create decision-making criteria and rules of investigative practices so as to adapt their work practices to the changing quality requirements, evolving international standards and digitalization of research documentation.Peer reviewe
Integration of biometrics and steganography: A comprehensive review
The use of an individual’s biometric characteristics to advance authentication and verification technology beyond the current dependence on passwords has been the subject of extensive research for some time. Since such physical characteristics cannot be hidden from the public eye, the security of digitised biometric data becomes paramount to avoid the risk of substitution or replay attacks. Biometric systems have readily embraced cryptography to encrypt the data extracted from the scanning of anatomical features. Significant amounts of research have also gone into the integration of biometrics with steganography to add a layer to the defence-in-depth security model, and this has the potential to augment both access control parameters and the secure transmission of sensitive biometric data. However, despite these efforts, the amalgamation of biometric and steganographic methods has failed to transition from the research lab into real-world applications. In light of this review of both academic and industry literature, we suggest that future research should focus on identifying an acceptable level steganographic embedding for biometric applications, securing exchange of steganography keys, identifying and address legal implications, and developing industry standards
Biometrics
Biometrics uses methods for unique recognition of humans based upon one or more intrinsic physical or behavioral traits. In computer science, particularly, biometrics is used as a form of identity access management and access control. It is also used to identify individuals in groups that are under surveillance. The book consists of 13 chapters, each focusing on a certain aspect of the problem. The book chapters are divided into three sections: physical biometrics, behavioral biometrics and medical biometrics. The key objective of the book is to provide comprehensive reference and text on human authentication and people identity verification from both physiological, behavioural and other points of view. It aims to publish new insights into current innovations in computer systems and technology for biometrics development and its applications. The book was reviewed by the editor Dr. Jucheng Yang, and many of the guest editors, such as Dr. Girija Chetty, Dr. Norman Poh, Dr. Loris Nanni, Dr. Jianjiang Feng, Dr. Dongsun Park, Dr. Sook Yoon and so on, who also made a significant contribution to the book
Reconocimiento de huellas dactilares para aplicaciones forenses
Tesis doctoral inédita leída en la Universidad Autónoma de Madrid, Escuela Politécnica Superior, Departamento de Tecnología Electrónica y de las Comunicaciones. Fecha de lectura: mayo de 2015The author was awarded with a European Commission Marie Curie Fellowship
under the Innovative Training Networks (ITN) in the project Bayesian Biometrics
for Forensics (BBfor2, FP7-PEOPLE-ITN-2008) under Grant Agreement number
238803 between 2011 and 2013. The author was also funded through the European
Union Project - Biometrics Evaluation and Testing (BEAT) for 2014 and 2015
which supported the research summarized in this Dissertatio
- …