162 research outputs found
PVSNet: Palm Vein Authentication Siamese Network Trained using Triplet Loss and Adaptive Hard Mining by Learning Enforced Domain Specific Features
Designing an end-to-end deep learning network to match the biometric features
with limited training samples is an extremely challenging task. To address this
problem, we propose a new way to design an end-to-end deep CNN framework i.e.,
PVSNet that works in two major steps: first, an encoder-decoder network is used
to learn generative domain-specific features followed by a Siamese network in
which convolutional layers are pre-trained in an unsupervised fashion as an
autoencoder. The proposed model is trained via triplet loss function that is
adjusted for learning feature embeddings in a way that minimizes the distance
between embedding-pairs from the same subject and maximizes the distance with
those from different subjects, with a margin. In particular, a triplet Siamese
matching network using an adaptive margin based hard negative mining has been
suggested. The hyper-parameters associated with the training strategy, like the
adaptive margin, have been tuned to make the learning more effective on
biometric datasets. In extensive experimentation, the proposed network
outperforms most of the existing deep learning solutions on three type of
typical vein datasets which clearly demonstrates the effectiveness of our
proposed method.Comment: Accepted in 5th IEEE International Conference on Identity, Security
and Behavior Analysis (ISBA), 2019, Hyderabad, Indi
Handbook of Vascular Biometrics
This open access handbook provides the first comprehensive overview of biometrics exploiting the shape of human blood vessels for biometric recognition, i.e. vascular biometrics, including finger vein recognition, hand/palm vein recognition, retina recognition, and sclera recognition. After an introductory chapter summarizing the state of the art in and availability of commercial systems and open datasets/open source software, individual chapters focus on specific aspects of one of the biometric modalities, including questions of usability, security, and privacy. The book features contributions from both academia and major industrial manufacturers
A Survey on Methods of Image Processing and Recognition for Personal Identification
The network of blood vessels possesses several properties that make a good biometric feature for personal identification: (1) they are difficult to damage and modify; (2) they are difficult to simulate using a fake template; and (3) vein information can represent the liveness of the person. In the process of recognition of the network of blood vessels, we encounter two main difficulties: the first difficulty concerns the enhancement of the image of blood vessels obtained from the camera working in visible and/or infrared light, and the second one concerns the process of extraction of features and methods of classification. In the first part, this chapter presents the basic methods of preprocessing biometric images. In the second part, we discuss the process of feature extraction with particular emphasis on the feature extraction from images depicting the network of blood vessels. This applies to texture analysis using the co-occurrence matrix, Gabor filtration, moments, and topological features using cross points. In the third part, we present the methods of processing images of the blood vessel network of dorsal part of the hand and wrist. We also discuss the process of reducing the dimensionality of a feature vector using the principal components analysis method
Finger Vein Recognition Based on a Personalized Best Bit Map
Finger vein patterns have recently been recognized as an effective biometric identifier. In this paper, we propose a finger vein recognition method based on a personalized best bit map (PBBM). Our method is rooted in a local binary pattern based method and then inclined to use the best bits only for matching. We first present the concept of PBBM and the generating algorithm. Then we propose the finger vein recognition framework, which consists of preprocessing, feature extraction, and matching. Finally, we design extensive experiments to evaluate the effectiveness of our proposal. Experimental results show that PBBM achieves not only better performance, but also high robustness and reliability. In addition, PBBM can be used as a general framework for binary pattern based recognition
Performance comparison of intrusion detection systems and application of machine learning to Snort system
This study investigates the performance of two open source intrusion detection systems (IDSs) namely Snort and Suricata for accurately detecting the malicious traffic on computer networks. Snort and Suricata were installed on two different but identical computers and the performance was evaluated at 10 Gbps network speed. It was noted that Suricata could process a higher speed of network traffic than Snort with lower packet drop rate but it consumed higher computational resources. Snort had higher detection accuracy and was thus selected for further experiments. It was observed that the Snort triggered a high rate of false positive alarms. To solve this problem a Snort adaptive plug-in was developed. To select the best performing algorithm for Snort adaptive plug-in, an empirical study was carried out with different learning algorithms and Support Vector Machine (SVM) was selected. A hybrid version of SVM and Fuzzy logic produced a better detection accuracy. But the best result was achieved using an optimised SVM with firefly algorithm with FPR (false positive rate) as 8.6% and FNR (false negative rate) as 2.2%, which is a good result. The novelty of this work is the performance comparison of two IDSs at 10 Gbps and the application of hybrid and optimised machine learning algorithms to Snort
A Survey on Biometrics and Cancelable Biometrics Systems
Now-a-days, biometric systems have replaced the password or token based authentication system in many fields to improve the security level. However, biometric system is also vulnerable to security threats. Unlike password based system, biometric templates cannot be replaced if lost or compromised. To deal with the issue of the compromised biometric template, template protection schemes evolved to make it possible to replace the biometric template. Cancelable biometric is such a template protection scheme that replaces a biometric template when the stored template is stolen or lost. It is a feature domain transformation where a distorted version of a biometric template is generated and matched in the transformed domain. This paper presents a review on the state-of-the-art and analysis of different existing methods of biometric based authentication system and cancelable biometric systems along with an elaborate focus on cancelable biometrics in order to show its advantages over the standard biometric systems through some generalized standards and guidelines acquired from the literature. We also proposed a highly secure method for cancelable biometrics using a non-invertible function based on Discrete Cosine Transformation (DCT) and Huffman encoding. We tested and evaluated the proposed novel method for 50 users and achieved good results
Accurate Biometric Palm Print Recognition Using ResNet50 algorithm Over X Gradient Boosting Algorithm
The aim of this research is to enhance the accuracy of biometric palm print identification by using the Novel ResNet50 Algorithm as compared to the X Gradient Boosting. Materials and Methods: In this study, the ResNet50 and X Gradient Boosting algorithms were compared using a sample size of 10 for each algorithm, resulting in a total sample size of 20. The comparison was carried out with a G Power of 0.8 and a confidence interval (CI) of 95% to ensure statistical significance. For this study the Birjand University Mobile Palmprint Database (BMPD) dataset was collected from the Kaggle repository, which includes a total of 1640 images containing both left and right-hand palmprints. Result: According to the results, the ResNet50 algorithm achieved a higher accuracy rate (94.7%) compared to the X Gradient Boosting algorithm (92.4%) in identifying and measuring the images. The statistical analysis indicated a significant difference between the Novel ResNet50 algorithm and X Gradient Boosting, with a pvalue of 0.003 (Independent sample T-test p<0.05). This suggests that the ResNet50 algorithm outperformed the X Gradient Boosting algorithm in this experiment. According to the study’s findings, ResNet50 is more effective in accurately identifying biometric palm prints compared to X Gradient Boosting
Finger Vein Recognition with Hybrid Deep Learning Approach
Finger vein biometrics is an identification technique based on the vein patterns in fingers, and it has the benefit of being difficult to counterfeit. Due to its high level of security, durability, and performance history, finger vein recognition captures our attention as one of the most significant authentication methods available today. Using a mixed deep learning approach, we investigate the challenge of identifying the finger vein sensor model. Thus far, we use Traditional LSTM architectures for this biometric modality. This work also suggests a brand-new hybrid architecture that shines due to its compactness and a merging with the LSMT layer to be taught. In the experiment, original samples as well as the region of interest data from eight freely available FV-USM datasets are employed. The standard LSTM-based strategy is preferable and produced better outcomes, as seen by the comparison with the earlier approaches. Moreover, the results show that the hybrid CNN and LSTM networks may be used to improve vein detection performance
- …