38,351 research outputs found
A statistical approach towards performance analysis of multimodal biometrics systems
Fueled by recent government mandates to deliver public functions by the use of biometrics, multimodal biometrics authentication has made rapid progress over the past a few years. Performance of multimodal biometrics systems plays a crucial role in government applications, including public security and forensic analysis. However, current performance analysis is conducted without considering the influence of noises, which may result in unreliable analytical results when noise levels change in practice. This thesis investigates the application of statistical methods in performance analysis of multimodal biometric systems. It develops an efficient and systematic approach to evaluate system performance in different situations of noise influences. Using this approach, 126 experiments are conducted with the BSSR1 dataset. The proposed approach helps to examine the performance of typical fusion methods that use different normalization and data partitioning techniques. Experiment results demonstrate that the Simple Sum fusion method working with the Min-Max normalization and Re-Substitution data partitioning yields the best overall performance in different noise conditions. In addition, further examination of the results reveals the need of systematic analysis of system performance as the performance of some fusion methods exhibits big variations when the level of noises changes and some fusion methods may produce very good performance in some application though normally unacceptable in others
On gait as a biometric: progress and prospects
There is increasing interest in automatic recognition by gait given its unique capability to recognize people at a distance when other biometrics are obscured. Application domains are those of any noninvasive biometric, but with particular advantage in surveillance scenarios. Its recognition capability is supported by studies in other domains such as medicine (biomechanics), mathematics and psychology which also suggest that gait is unique. Further, examples of recognition by gait can be found in literature, with early reference by Shakespeare concerning recognition by the way people walk. Many of the current approaches confirm the early results that suggested gait could be used for identification, and now on much larger databases. This has been especially influenced by DARPA’s Human ID at a Distance research program with its wide scenario of data and approaches. Gait has benefited from the developments in other biometrics and has led to new insight particularly in view of covariates. Equally, gait-recognition approaches concern extraction and description of moving articulated shapes and this has wider implications than just in biometrics
Predictive biometrics: A review and analysis of predicting personal characteristics from biometric data
Interest in the exploitation of soft biometrics information has continued to develop over the last decade or so. In comparison with traditional biometrics, which focuses principally on person identification, the idea of soft biometrics processing is to study the utilisation of more general information regarding a system user, which is not necessarily unique. There are increasing indications that this type of data will have great value in providing complementary information for user authentication. However, the authors have also seen a growing interest in broadening the predictive capabilities of biometric data, encompassing both easily definable characteristics such as subject age and, most recently, `higher level' characteristics such as emotional or mental states. This study will present a selective review of the predictive capabilities, in the widest sense, of biometric data processing, providing an analysis of the key issues still adequately to be addressed if this concept of predictive biometrics is to be fully exploited in the future
Conceivable security risks and authentication techniques for smart devices
With the rapidly escalating use of smart devices and fraudulent transaction of users’ data from their devices, efficient and reliable techniques for authentication of the smart devices have become an obligatory issue. This paper reviews the security risks for mobile devices and studies several authentication techniques available for smart devices. The results from field studies enable a comparative evaluation of user-preferred authentication mechanisms and their opinions about reliability, biometric authentication and visual authentication techniques
The ear as a biometric
It is more than 10 years since the first tentative experiments in ear biometrics were conducted and it has now reached the “adolescence” of its development towards a mature biometric. Here we present a timely retrospective of the ensuing research since those early days. Whilst its detailed structure may not be as complex as the iris, we show that the ear has unique security advantages over other biometrics. It is most unusual, even unique, in that it supports not only visual and forensic recognition, but also acoustic recognition at the same time. This, together with its deep three-dimensional structure and its robust resistance to change with age will make it very difficult to counterfeit thus ensuring that the ear will occupy a special place in situations requiring a high degree of protection
Recommended from our members
A schema for cryptographic keys generation using hybrid biometrics
Biometric identifiers refer to unique physical properties or behavioural attributes of individuals. Some of the well known biometric identifiers are voice, finger prints, retina or iris, facial structure etc. In our daily interaction with others directly or indirectly, we implicitly use biometrics to know, distinguish and trust people. Biometric identifiers represent the concept of "who a person is" by gathering vital characteristics that don't correspond to any other person. The human brain to some extent is able to ascertain disparities or variation in certain physical attributes and yet verify the authenticity of a person. But this is difficult to be implemented in electronic systems due to the intense requirements of artificial decision making and hard-coded logic.
This paper examines the possibility of using a combination of biometric attributes to overcome common problems in having a single biometric scheme for authentication. It also investigates possible schemes and features to deal with variations in Biometric attributes. The material presented is related to ongoing research by the Computer Communications Research Group at Leeds Metropolitan University. We use this paper as a starting step and as a plan for advanced research. It offers ideas and proposition for implementing hybrid biometrics in conjunction with cryptography. This is work in progress and is in a very preliminary stage
Development of CUiris: A Dark-Skinned African Iris Dataset for Enhancement of Image Analysis and Robust Personal Recognition
Iris recognition algorithms, especially with the
emergence of large-scale iris-based identification systems, must
be tested for speed and accuracy and evaluated with a wide
range of templates – large size, long-range, visible and different
origins. This paper presents the acquisition of eye-iris images
of dark-skinned subjects in Africa, a predominant case of verydark-
brown iris images, under near-infrared illumination. The
peculiarity of these iris images is highlighted from the
histogram and normal probability distribution of their
grayscale image entropy (GiE) values, in comparison to Asian
and Caucasian iris images. The acquisition of eye-images for
the African iris dataset is ongoing and will be made publiclyavailable
as soon as it is sufficiently populated
- …