2,438 research outputs found
Likelihood-Ratio-Based Biometric Verification
The paper presents results on optimal similarity measures for biometric verification based on fixed-length feature vectors. First, we show that the verification of a single user is equivalent to the detection problem, which implies that, for single-user verification, the likelihood ratio is optimal. Second, we show that, under some general conditions, decisions based on posterior probabilities and likelihood ratios are equivalent and result in the same receiver operating curve. However, in a multi-user situation, these two methods lead to different average error rates. As a third result, we prove theoretically that, for multi-user verification, the use of the likelihood ratio is optimal in terms of average error rates. The superiority of this method is illustrated by experiments in fingerprint verification. It is shown that error rates below 10/sup -3/ can be achieved when using multiple fingerprints for template construction
Genetic Programming for Multibiometrics
Biometric systems suffer from some drawbacks: a biometric system can provide
in general good performances except with some individuals as its performance
depends highly on the quality of the capture. One solution to solve some of
these problems is to use multibiometrics where different biometric systems are
combined together (multiple captures of the same biometric modality, multiple
feature extraction algorithms, multiple biometric modalities...). In this
paper, we are interested in score level fusion functions application (i.e., we
use a multibiometric authentication scheme which accept or deny the claimant
for using an application). In the state of the art, the weighted sum of scores
(which is a linear classifier) and the use of an SVM (which is a non linear
classifier) provided by different biometric systems provide one of the best
performances. We present a new method based on the use of genetic programming
giving similar or better performances (depending on the complexity of the
database). We derive a score fusion function by assembling some classical
primitives functions (+, *, -, ...). We have validated the proposed method on
three significant biometric benchmark datasets from the state of the art
Usability and Trust in Information Systems
The need for people to protect themselves and their assets is as old as humankind. People's physical safety and their possessions have always been at risk from deliberate attack or accidental damage. The advance of information technology means that many individuals, as well as corporations, have an additional range of physical (equipment) and electronic (data) assets that are at risk. Furthermore, the increased number and types of interactions in cyberspace has enabled new forms of attack on people and their possessions. Consider grooming of minors in chat-rooms, or Nigerian email cons: minors were targeted by paedophiles before the creation of chat-rooms, and Nigerian criminals sent the same letters by physical mail or fax before there was email. But the technology has decreased the cost of many types of attacks, or the degree of risk for the attackers. At the same time, cyberspace is still new to many people, which means they do not understand risks, or recognise the signs of an attack, as readily as they might in the physical world. The IT industry has developed a plethora of security mechanisms, which could be used to mitigate risks or make attacks significantly more difficult. Currently, many people are either not aware of these mechanisms, or are unable or unwilling or to use them. Security experts have taken to portraying people as "the weakest link" in their efforts to deploy effective security [e.g. Schneier, 2000]. However, recent research has revealed at least some of the problem may be that security mechanisms are hard to use, or be ineffective. The review summarises current research on the usability of security mechanisms, and discusses options for increasing their usability and effectiveness
Feature Level Fusion of Face and Fingerprint Biometrics
The aim of this paper is to study the fusion at feature extraction level for
face and fingerprint biometrics. The proposed approach is based on the fusion
of the two traits by extracting independent feature pointsets from the two
modalities, and making the two pointsets compatible for concatenation.
Moreover, to handle the problem of curse of dimensionality, the feature
pointsets are properly reduced in dimension. Different feature reduction
techniques are implemented, prior and after the feature pointsets fusion, and
the results are duly recorded. The fused feature pointset for the database and
the query face and fingerprint images are matched using techniques based on
either the point pattern matching, or the Delaunay triangulation. Comparative
experiments are conducted on chimeric and real databases, to assess the actual
advantage of the fusion performed at the feature extraction level, in
comparison to the matching score level.Comment: 6 pages, 7 figures, conferenc
Research Note: Biometric Technology Applications and Trends in Hotels
The purpose of this study is to investigate the biometrics technologies adopted by hotels and the perception of hotel managers toward biometric technology applications. A descriptive, cross sectional survey was developed based on extensive review of literature and expert opinions. The population for this survey was property level executive managers in the U.S. hotels. Members of American Hotel and Lodging Association (AHLA) were selected as the target population for this study. The most frequent use of biometric technology is by hotel employees in the form of fingerprint scanning. Cost still seems to be one of the major barriers to adoption of biometric technology applications. The findings of this study showed that there definitely is a future in using biometric technology applications in hotels in the future, however, according to hoteliers; neither guests nor hoteliers are ready for it fully
Public Enlightenment Education on the acceptance of Fingerprint Biometric Technology for administration in academic institutions and other organizations
This research presents the overview of the origin of fingerprint biometric technology, the opinion of the public on the acceptance of fingerprint biometric technology and the means of instilling confidence on the public for the total acceptance of the technology. Data was collected with the aid of a lecture and structured questionnaires distributed to 50 respondents in NewLine Computer training Center Ltd. Abakpa. There were lectures and interviews conducted by the researcher and questionnaires completion by the selected population of 50 people comprising of age between 18 and 65 years. The 50 people consist of individuals from education, technology and government organisations.  The organisation was done by the Researchers and three members of staff of NewLine Computer training Center Ltd. Abakpa Nike Enugu. The lectures enlightened the 50 participants/respondents that fingerprint is a discontinuous variation and that no two persons have exactly the same fingerprint. The study revealed that it is obvious that confidence will be instilled in the public if there is public enlightenment as the number of respondents who believe that fingerprint cannot be stolen or copied is 92% although 8% of the respondents is still biased after the lectures. The research will instil confidence in the use of fingerprint biometric technology and will break the shackles of currently being a misunderstood novelty to a widespread, mainstream personal identity authentication tool. Keywords: Authentication, Biometric Technology, Chip Implantation, Fingerprint Acquisition, Identity Management
Employee perception on the importance of a fingerprint based attendance management system and its association with punctuality at information. management unit (IMU) of Ethekwini Municipality.
Masters Degree. University of KwaZulu-Natal, Durban.Punctuality is a worldwide phenomenon; critical for fulfilling and satisfying the organisationâs obligations to its stakeholders. Non- adherence to it may result in fatalities especially in organisations offering essential services, while it may mean loss of business to commercial companies. The aim of this study was to establish employee perceptions on the importance of a fingerprint-based attendance management system and its effect on punctuality within the Information Management Unit at EThekwini Municipality. The targeted population was the unitâs staff complement which amounted to 300. The choice of one unit was due to the manageability of numbers seen to be possible within the timelines set for the study. A total of 285 of the total population belonged to the employee component while 15 belonged to management. As the study employed a mixed methodology, the quantitative approach was administered to employees while the qualitative was administered to management. The pretesting of the questionnaire was administered to 10 participants whereby the results showed a Cronbachâs Alpha of 0.8. The sample size for quantitative study was 120 randomly selected participants and was administered through an online questionnaire while the qualitative instrument was administered to managers through individual interviews. Five managers were purposively selected based on their experience within the unit. The survey results showed the participantsâ perception to be in favour of a fingerprint-based attendance management system. The qualitative portion of the study revealed mixed responses about the importance of punctuality. To some punctuality was mainly important for meetings while others viewed it as important for arriving at their work stations in time as regulated by the collective basic conditions of employment. The study was expected to reveal the employee perceptions of the fingerprint based time management system and its effect on punctuality. It was anticipated that such understanding would encourage extension of the study to other units of eThekwini Municipality thereby enabling employee perception realignment to the fundamental benefits derived from the system; so punctuality, among other things such as performance and productivity, may be enhanced
Beyond Security and Privacy Perception: An Approach to Biometric Authentication Perception Change
The aim of the paper is to shed light on the factors affecting perception shifts in biometrics authentication. This study explores trust relationships in the adoption of biometrics using the valence framework to understand and explain the individualâs evaluation of risk concerning biometrics. Hypotheses are developed to suggest that individualsâ intention to use biometrics is influenced by trust in the vendor. An experiment to test the hypotheses is described. Expected contributions, limitations, and possibilities for future research are noted
- âŠ