332 research outputs found

    Distorted Fingerprint Verification System

    Get PDF
    Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications.Biometric, Fingerprints, Distortion, Fuzzy Clustering, Cost Sensitive Classifier

    Non-minutiae based fingerprint descriptor

    Get PDF

    Distorted Fingerprint Verification System

    Get PDF
    Fingerprint verification is one of the most reliable personal identification methods. Fingerprint matching is affected by non-linear distortion introduced in fingerprint impression during the image acquisition process. This non-linear deformation changes both the position and orientation of minutiae. The proposed system operates in three stages: alignment based fingerprint matching, fuzzy clustering and classifier framework. First, an enhanced input fingerprint image has been aligned with the template fingerprint image and matching score is computed. To improve the performance of the system, a fuzzy clustering based on distance and density has been used to cluster the feature set obtained from the fingerprint matcher. Finally a classifier framework has been developed and found that cost sensitive classifier produces better results. The system has been evaluated on fingerprint database and the experimental result shows that system produces a verification rate of 96%. This system plays an important role in forensic and civilian applications

    Biometrics in Cyber Security

    Get PDF
    Computers play an important role in our daily lives and its usage has grown manifolds today. With ever increasing demand of security regulations all over the world and large number of services provided using the internet in day to day life, the assurance of security associated with such services has become a crucial issue. Biometrics is a key to the future of data/cyber security. This paper presents a biometric recognition system which can be embedded in any system involving access control, e-commerce, online banking, computer login etc. to enhance the security. Fingerprint is an old and mature technology which has been used in this work as biometric trait. In this paper a fingerprint recognition system based on no minutiae features: Fuzzy features and Invariant moment features has been developed. Fingerprint images from FVC2002 are used for experimentation. The images are enhanced for improving the quality and a region of interest (ROI) is cropped around the core point. Two sets of features are extracted from ROI and support vector machine (SVM) is used for verification. An accuracy of 95 per cent is achieved with the invariant moment features using RBF kernel in SVM

    Evaluating the Performance of a Large-Scale Facial Image Dataset Using Agglomerated Match Score Statistics

    Get PDF
    Biometrics systems are experiencing wide-spread usage in identification and access control applications. To estimate the performance of any biometric systems, their characteristics need to be analyzed to make concrete conclusions for real time usage. Performance testing of hardware or software components of either custom or state-of-the-art commercial biometric systems is typically carried out on large datasets. Several public and private datasets are used in current biometric research. West Virginia University has completed several large scale multimodal biometric data collection with an aim to create research datasets that can be used by disciplines concerning secured biometric applications. However, the demographic and image quality properties of these datasets can potentially lead to bias when they are used in performance testing of new systems. To overcome this, the characteristics of datasets used for performance testing must be well understood prior to usage.;This thesis will answer three main questions associated with this issue:;• For a single matcher, do the genuine and impostor match score distributions within specific demographics groups vary from those of the entire dataset? • What are the possible ways to compare the subset of demographic match score distributions against those of the entire dataset? • Based on these comparisons, what conclusions can be made about the characteristics of dataset?;In this work, 13,976 frontal face images from WVU\u27s 2012 Biometric collection project funded by the FBI involving 1200 individuals were used as a \u27test\u27 dataset. The goal was to evaluate performance of this dataset by generating genuine and impostor match scores distributions using a commercial matching software Further, the dataset was categorized demographically, and match score distributions were generated for these subsets in order to explore whether or not this breakdown impacted match score distributions. The match score distributions of the overall dataset were compared against each demographic cohorts.;Using statistical measures, Area under Curve (AUC) and Equal Error Rate (EER) were observed by plotting Receiver Operating Characteristics (ROC) curves to measure the performance of each demographic group with respect to overall data and also within the cohorts of demographic group. Also, Kull-back Leibler Divergence and Jensen Shannon Divergence values were calculated for each demographic cohort (age, gender and ethnicity) within the overall data. These statistical approaches provide a numerical value representing the amount of variation between two match score distributions In addition, FAR and FRR was observed to estimate the error rates. These statistical measures effectively enabled the determination of the impact of different demographic breakdown on match score distributions, and thus, helped in understanding the characteristics of dataset and how they may impact its usage in performance testing biometrics

    The fundamentals of unimodal palmprint authentication based on a biometric system: A review

    Get PDF
    Biometric system can be defined as the automated method of identifying or authenticating the identity of a living person based on physiological or behavioral traits. Palmprint biometric-based authentication has gained considerable attention in recent years. Globally, enterprises have been exploring biometric authorization for some time, for the purpose of security, payment processing, law enforcement CCTV systems, and even access to offices, buildings, and gyms via the entry doors. Palmprint biometric system can be divided into unimodal and multimodal. This paper will investigate the biometric system and provide a detailed overview of the palmprint technology with existing recognition approaches. Finally, we introduce a review of previous works based on a unimodal palmprint system using different databases

    Performance comparison of intrusion detection systems and application of machine learning to Snort system

    Get PDF
    This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort

    A Survey on Biometrics and Cancelable Biometrics Systems

    Get PDF
    Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results
    corecore