2,438 research outputs found

    Likelihood-Ratio-Based Biometric Verification

    Get PDF
    The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal. Second, we show that, under some general conditions, decisions based on posterior probabilities and likelihood ratios are equivalent and result in the same receiver operating curve. However, in a multi-user situation, these two methods lead to different average error rates. As a third result, we prove theoretically that, for multi-user verification, the use of the likelihood ratio is optimal in terms of average error rates. The superiority of this method is illustrated by experiments in fingerprint verification. It is shown that error rates below 10/sup -3/ can be achieved when using multiple fingerprints for template construction

    Genetic Programming for Multibiometrics

    Full text link
    Biometric systems suffer from some drawbacks: a biometric system can provide in general good performances except with some individuals as its performance depends highly on the quality of the capture. One solution to solve some of these problems is to use multibiometrics where different biometric systems are combined together (multiple captures of the same biometric modality, multiple feature extraction algorithms, multiple biometric modalities...). In this paper, we are interested in score level fusion functions application (i.e., we use a multibiometric authentication scheme which accept or deny the claimant for using an application). In the state of the art, the weighted sum of scores (which is a linear classifier) and the use of an SVM (which is a non linear classifier) provided by different biometric systems provide one of the best performances. We present a new method based on the use of genetic programming giving similar or better performances (depending on the complexity of the database). We derive a score fusion function by assembling some classical primitives functions (+, *, -, ...). We have validated the proposed method on three significant biometric benchmark datasets from the state of the art

    Usability and Trust in Information Systems

    Get PDF
    The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness

    Feature Level Fusion of Face and Fingerprint Biometrics

    Full text link
    The aim of this paper is to study the fusion at feature extraction level for face and fingerprint biometrics. The proposed approach is based on the fusion of the two traits by extracting independent feature pointsets from the two modalities, and making the two pointsets compatible for concatenation. Moreover, to handle the problem of curse of dimensionality, the feature pointsets are properly reduced in dimension. Different feature reduction techniques are implemented, prior and after the feature pointsets fusion, and the results are duly recorded. The fused feature pointset for the database and the query face and fingerprint images are matched using techniques based on either the point pattern matching, or the Delaunay triangulation. Comparative experiments are conducted on chimeric and real databases, to assess the actual advantage of the fusion performed at the feature extraction level, in comparison to the matching score level.Comment: 6 pages, 7 figures, conferenc

    Research Note: Biometric Technology Applications and Trends in Hotels

    Get PDF
    The purpose of this study is to investigate the biometrics technologies adopted by hotels and the perception of hotel managers toward biometric technology applications. A descriptive, cross sectional survey was developed based on extensive review of literature and expert opinions. The population for this survey was property level executive managers in the U.S. hotels. Members of American Hotel and Lodging Association (AHLA) were selected as the target population for this study. The most frequent use of biometric technology is by hotel employees in the form of fingerprint scanning. Cost still seems to be one of the major barriers to adoption of biometric technology applications. The findings of this study showed that there definitely is a future in using biometric technology applications in hotels in the future, however, according to hoteliers; neither guests nor hoteliers are ready for it fully

    Public Enlightenment Education on the acceptance of Fingerprint Biometric Technology for administration in academic institutions and other organizations

    Get PDF
    This research presents the overview of the origin of fingerprint biometric technology, the opinion of the public on the acceptance of fingerprint biometric technology and the means of instilling confidence on the public for the total acceptance of the technology.  Data was collected with the aid of a lecture and structured questionnaires distributed to 50 respondents in NewLine Computer training Center Ltd. Abakpa. There were lectures and interviews conducted by the researcher and questionnaires completion by the selected population of 50 people comprising of age between 18 and 65 years. The 50 people consist of individuals from education, technology and government organisations.   The organisation was done by the Researchers and three members of staff of NewLine Computer training Center Ltd. Abakpa Nike Enugu. The lectures enlightened the 50 participants/respondents that fingerprint is a discontinuous variation and that no two persons have exactly the same fingerprint. The study revealed that it is obvious that confidence will be instilled in the public if there is public enlightenment as the number of respondents who believe that fingerprint cannot be stolen or copied is 92% although 8% of the respondents is still biased after the lectures. The research will instil confidence in the use of fingerprint biometric technology and will break the shackles of currently being a misunderstood novelty to a widespread, mainstream personal identity authentication tool. Keywords: Authentication, Biometric Technology, Chip Implantation, Fingerprint Acquisition, Identity Management

    Employee perception on the importance of a fingerprint based attendance management system and its association with punctuality at information. management unit (IMU) of Ethekwini Municipality.

    Get PDF
    Masters Degree. University of KwaZulu-Natal, Durban.Punctuality is a worldwide phenomenon; critical for fulfilling and satisfying the organisation’s obligations to its stakeholders. Non- adherence to it may result in fatalities especially in organisations offering essential services, while it may mean loss of business to commercial companies. The aim of this study was to establish employee perceptions on the importance of a fingerprint-based attendance management system and its effect on punctuality within the Information Management Unit at EThekwini Municipality. The targeted population was the unit’s staff complement which amounted to 300. The choice of one unit was due to the manageability of numbers seen to be possible within the timelines set for the study. A total of 285 of the total population belonged to the employee component while 15 belonged to management. As the study employed a mixed methodology, the quantitative approach was administered to employees while the qualitative was administered to management. The pretesting of the questionnaire was administered to 10 participants whereby the results showed a Cronbach’s Alpha of 0.8. The sample size for quantitative study was 120 randomly selected participants and was administered through an online questionnaire while the qualitative instrument was administered to managers through individual interviews. Five managers were purposively selected based on their experience within the unit. The survey results showed the participants’ perception to be in favour of a fingerprint-based attendance management system. The qualitative portion of the study revealed mixed responses about the importance of punctuality. To some punctuality was mainly important for meetings while others viewed it as important for arriving at their work stations in time as regulated by the collective basic conditions of employment. The study was expected to reveal the employee perceptions of the fingerprint based time management system and its effect on punctuality. It was anticipated that such understanding would encourage extension of the study to other units of eThekwini Municipality thereby enabling employee perception realignment to the fundamental benefits derived from the system; so punctuality, among other things such as performance and productivity, may be enhanced

    Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change

    Get PDF
    The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individual’s evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individuals’ intention to use biometrics is influenced by trust in the vendor. An experiment to test the hypotheses is described. Expected contributions, limitations, and possibilities for future research are noted
    • 

    corecore