113 research outputs found

    Fusion of geometric and texture features for finger knuckle surface recognition

    Get PDF
    AbstractHand-based biometrics plays a significant role in establishing security for real-time environments involving human interaction and is found to be more successful in terms of high speed and accuracy. This paper investigates on an integrated approach for personal authentication using Finger Back Knuckle Surface (FBKS) based on two methodologies viz., Angular Geometric Analysis based Feature Extraction Method (AGFEM) and Contourlet Transform based Feature Extraction Method (CTFEM). Based on these methods, this personal authentication system simultaneously extracts shape oriented feature information and textural pattern information of FBKS for authenticating an individual. Furthermore, the proposed geometric and textural analysis methods extract feature information from both proximal phalanx and distal phalanx knuckle regions (FBKS), while the existing works of the literature concentrate only on the features of proximal phalanx knuckle region. The finger joint region found nearer to the tip of the finger is called distal phalanx region of FBKS, which is a unique feature and has greater potentiality toward identification. Extensive experiments conducted using newly created database with 5400 FBKS images and the obtained results infer that the integration of shape oriented features with texture feature information yields excellent accuracy rate of 99.12% with lowest equal error rate of 1.04%

    Palmprint Recognition Using Different Level of Information Fusion

    Get PDF
    The aim of this paper is to investigate a fusion approach suitable for palmprint recognition. Several number of fusion stageis analyse such as feature, matching and decision level. Fusion at feature level is able to increase discrimination power in the feature space by producing high dimensional fuse feature vector. Fusion at matching score level utilizes the matching output from different classifier to form a single value for decision process. Fusion at decision level on the other hand utilizes minimal information from a different matching process and the integration at this stage is less complex compare to other approach. The analysis shows integration at feature level produce the best recognition rates compare to the other method

    Multimodal Biometrics for Person Authentication

    Get PDF
    Unimodal biometric systems have limited effectiveness in identifying people, mainly due to their susceptibility to changes in individual biometric features and presentation attacks. The identification of people using multimodal biometric systems attracts the attention of researchers due to their advantages, such as greater recognition efficiency and greater security compared to the unimodal biometric system. To break into the biometric multimodal system, the intruder would have to break into more than one unimodal biometric system. In multimodal biometric systems: The availability of many features means that the multimodal system becomes more reliable. A multimodal biometric system increases security and ensures confidentiality of user data. A multimodal biometric system realizes the merger of decisions taken under individual modalities. If one of the modalities is eliminated, the system can still ensure security, using the remaining. Multimodal systems provide information on the “liveness” of the sample being introduced. In a multimodal system, a fusion of feature vectors and/or decisions developed by each subsystem is carried out, and then the final decision on identification is made on the basis of the vector of features thus obtained. In this chapter, we consider a multimodal biometric system that uses three modalities: dorsal vein, palm print, and periocular

    Building a Strong Undergraduate Research Culture in African Universities

    Get PDF
    Africa had a late start in the race to setting up and obtaining universities with research quality fundamentals. According to Mamdani [5], the first colonial universities were few and far between: Makerere in East Africa, Ibadan and Legon in West Africa. This last place in the race, compared to other continents, has had tremendous implications in the development plans for the continent. For Africa, the race has been difficult from a late start to an insurmountable litany of problems that include difficulty in equipment acquisition, lack of capacity, limited research and development resources and lack of investments in local universities. In fact most of these universities are very recent with many less than 50 years in business except a few. To help reduce the labor costs incurred by the colonial masters of shipping Europeans to Africa to do mere clerical jobs, they started training ―workshops‖ calling them technical or business colleges. According to Mamdani, meeting colonial needs was to be achieved while avoiding the ―Indian disease‖ in Africa -- that is, the development of an educated middle class, a group most likely to carry the virus of nationalism. Upon independence, most of these ―workshops‖ were turned into national ―universities‖, but with no clear role in national development. These national ―universities‖ were catering for children of the new African political elites. Through the seventies and eighties, most African universities were still without development agendas and were still doing business as usual. Meanwhile, governments strapped with lack of money saw no need of putting more scarce resources into big white elephants. By mid-eighties, even the UN and IMF were calling for a limit on funding African universities. In today‘s African university, the traditional curiosity driven research model has been replaced by a market-driven model dominated by a consultancy culture according to Mamdani (Mamdani, Mail and Guardian Online). The prevailing research culture as intellectual life in universities has been reduced to bare-bones classroom activity, seminars and workshops have migrated to hotels and workshop attendance going with transport allowances and per diems (Mamdani, Mail and Guardian Online). There is need to remedy this situation and that is the focus of this paper

    Fingerprint Recognition in Biometric Security -A State of the Art

    Get PDF
    Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud. so that they square measure being replaced by identity verification mechanisms. Among bioscience, fingerprint systems are one amongst most generally researched and used. it\'s fashionable due to their easy accessibility. during this paper we tend to discuss the elaborated study of various gift implementation define strategies together with their comparative measures and result analysis thus as realize a brand new constructive technique for fingerprint recognition

    A Hand-Based Biometric Verification System Using Ant Colony Optimization

    Get PDF
    This paper presents a novel personal authentication system using hand-based biometrics, which utilizes internal (beneath the skin) structure of veins on the dorsal part of the hand and the outer shape of the hand. The hand-vein and the hand-shape images can be simultaneously acquired by using infrared thermal and digital camera respectively. A claimed identity is authenticated by integrating these two traits based on the score-level fusion in which four fusion rules are used for the integration. Before their fusion, each modality is evaluated individually in terms of error rates and weights are assigned according to their performance. In order to achieve an adaptive security in the proposed bimodal system, an optimal selection of fusion parameters is required. Hence, Ant Colony Optimization (ACO) is employed in the bimodal system to select the weights and also one out of the four fusion rules optimally for the adaptive fusion of the two modalities to meet the user defined security levels. The databases of hand-veins and the hand-shapes consisting of 150 users are acquired using the peg-free imaging setup. The experimental results show genuine acceptance rate (GAR) of 98% at false acceptance rate (FAR) of 0.001% and the system has the potential for any online personal authentication based application.

    Biometric Systems

    Get PDF
    Because of the accelerating progress in biometrics research and the latest nation-state threats to security, this book's publication is not only timely but also much needed. This volume contains seventeen peer-reviewed chapters reporting the state of the art in biometrics research: security issues, signature verification, fingerprint identification, wrist vascular biometrics, ear detection, face detection and identification (including a new survey of face recognition), person re-identification, electrocardiogram (ECT) recognition, and several multi-modal systems. This book will be a valuable resource for graduate students, engineers, and researchers interested in understanding and investigating this important field of study

    Fingerprint Recognition in Biometric Security -A State of the Art

    Get PDF
    Today, because of the vulnerability of standard authentication system, law-breaking has accumulated within the past few years. Identity authentication that relies on biometric feature like face, iris, voice, hand pure mathematics, handwriting, retina, fingerprints will considerably decrease the fraud. so that they square measure being replaced by identity verification mechanisms. Among bioscience, fingerprint systems are one amongst most generally researched and used. it\'s fashionable due to their easy accessibility. during this paper we tend to discuss the elaborated study of various gift implementation define strategies together with their comparative measures and result analysis thus as realize a brand new constructive technique for fingerprint recognition
    • 

    corecore